{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T09:56:54Z","timestamp":1773482214490,"version":"3.50.1"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T00:00:00Z","timestamp":1764115200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T00:00:00Z","timestamp":1764115200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Data Sci Anal"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1007\/s41060-025-00960-3","type":"journal-article","created":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T19:04:44Z","timestamp":1764183884000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Cyber insights: exploring the effectiveness of image-based and vector-based feature representations in insider threat detection"],"prefix":"10.1007","volume":"21","author":[{"given":"Krunal Dhanraj","family":"Randive","sequence":"first","affiliation":[]},{"given":"R.","family":"Mohan","sequence":"additional","affiliation":[]},{"given":"Ambairam Muthu","family":"Sivakrishna","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,26]]},"reference":[{"key":"960_CR1","doi-asserted-by":"publisher","first-page":"102221","DOI":"10.1016\/j.cose.2021.102221","volume":"104","author":"S Yuan","year":"2021","unstructured":"Yuan, S., Wu, X.: Deep learning for insider threat detection: review, challenges and opportunities. Comput. Secur. 104, 102221 (2021)","journal-title":"Comput. Secur."},{"key":"960_CR2","unstructured":"Ekran, S.: 5 Real-life data breaches caused by insider threats. https:\/\/www.ekransystem.com\/en\/blog\/real-life-examples-insider-threat-caused-breaches (2022)"},{"key":"960_CR3","unstructured":"Khan, N.A., Brohi, S.N., Zaman, N.: Ten deadly cyber security threats amid covid-19 pandemic. Authorea Preprints (2023)"},{"key":"960_CR4","unstructured":"CERT-IN: Annual report 2021. https:\/\/www.cert-in.org.in\/s2cMainServlet?pageid=PUBANULREPRT (2021)"},{"key":"960_CR5","unstructured":"Ponemon, I.: 2022 Cost of insider threat global report. https:\/\/static.poder360.com.br\/2022\/01\/pfpt-us-tr-the-cost-of-insider-threats-ponemon-report.pdf (2022)"},{"key":"960_CR6","unstructured":"Cybersecurity, I.: 2023 Insider Threat Report. https:\/\/static.poder360.com.br\/2022\/01\/pfpt-us-tr-the-cost-of-insider-threats-ponemon-report.pdf (2023)"},{"key":"960_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-024-20273-0","volume":"84","author":"A Jaiswal","year":"2024","unstructured":"Jaiswal, A., Dwivedi, P., Dewang, R.K.: Machine learning approaches to detect, prevent and mitigate malicious insider threats: state-of-the-art review. Multimed. Tools Appl. 84, 1\u201341 (2024)","journal-title":"Multimed. Tools Appl."},{"issue":"4","key":"960_CR8","doi-asserted-by":"publisher","first-page":"122","DOI":"10.3390\/info10040122","volume":"10","author":"DS Berman","year":"2019","unstructured":"Berman, D.S., Buczak, A.L., Chavis, J.S., Corbett, C.L.: A survey of deep learning methods for cyber security. Information 10(4), 122 (2019)","journal-title":"Information"},{"key":"960_CR9","doi-asserted-by":"publisher","first-page":"30907","DOI":"10.1109\/ACCESS.2024.3369906","volume":"12","author":"FR Alzaabi","year":"2024","unstructured":"Alzaabi, F.R., Mehmood, A.: A review of recent advances, challenges, and opportunities in malicious insider threat detection using machine learning methods. IEEE Access 12, 30907\u201330927 (2024)","journal-title":"IEEE Access"},{"issue":"2","key":"960_CR10","first-page":"221","volume":"12","author":"U Rauf","year":"2023","unstructured":"Rauf, U., Mohsen, F., Wei, Z.: A taxonomic classification of insider threats: existing techniques, future directions & recommendations. J. Cyber Secur. Mobil. 12(2), 221\u2013252 (2023)","journal-title":"J. Cyber Secur. Mobil."},{"issue":"15","key":"960_CR11","doi-asserted-by":"publisher","first-page":"5208","DOI":"10.3390\/app10155208","volume":"10","author":"MN Al-Mhiqani","year":"2020","unstructured":"Al-Mhiqani, M.N., Ahmad, R., Zainal Abidin, Z., Yassin, W., Hassan, A., Abdulkareem, K.H., Ali, N.S., Yunos, Z.: A review of insider threat detection: classification, machine learning techniques, datasets, open challenges, and recommendations. Appl. Sci. 10(15), 5208 (2020)","journal-title":"Appl. Sci."},{"key":"960_CR12","doi-asserted-by":"publisher","first-page":"108519","DOI":"10.1016\/j.compeleceng.2022.108519","volume":"105","author":"S Asha","year":"2023","unstructured":"Asha, S., Shanmugapriya, D., Padmavathi, G.: Malicious insider threat detection using variation of sampling methods for anomaly detection in cloud environment. Comput. Electr. Eng. 105, 108519 (2023)","journal-title":"Comput. Electr. Eng."},{"key":"960_CR13","doi-asserted-by":"publisher","first-page":"103779","DOI":"10.1016\/j.cose.2024.103779","volume":"140","author":"S-M Duan","year":"2024","unstructured":"Duan, S.-M., Yuan, J.-T., Wang, B.: Contextual feature representation for image-based insider threat classification. Comput. Secur. 140, 103779 (2024)","journal-title":"Comput. Secur."},{"issue":"14","key":"960_CR14","doi-asserted-by":"publisher","first-page":"4945","DOI":"10.3390\/app10144945","volume":"10","author":"R Gayathri","year":"2020","unstructured":"Gayathri, R., Sajjanhar, A.: Xiang: image-based feature representation for insider threat classification. Appl. Sci. 10(14), 4945 (2020)","journal-title":"Appl. Sci."},{"key":"960_CR15","doi-asserted-by":"publisher","first-page":"126588","DOI":"10.1016\/j.neucom.2023.126588","volume":"553","author":"KD Randive","year":"2023","unstructured":"Randive, K.D., Ramasundaram, M.: Mwcapsnet: a novel multi-level wavelet capsule network for insider threat detection using image representations. Neurocomputing 553, 126588 (2023)","journal-title":"Neurocomputing"},{"key":"960_CR16","first-page":"1","volume":"2021","author":"D Li","year":"2021","unstructured":"Li, D., Yang, L., Zhang, H., Wang, X., Ma, L., Xiao, J.: Image-based insider threat detection via geometric transformation. Secur. Commun. Netw. 2021, 1\u201318 (2021)","journal-title":"Secur. Commun. Netw."},{"key":"960_CR17","volume":"73","author":"K Randive","year":"2023","unstructured":"Randive, K., Mohan, R., Sivakrishna, A.M.: An efficient pattern-based approach for insider threat classification using the image-based feature representation. J. Inf. Secur. Appl. 73, 103434 (2023)","journal-title":"J. Inf. Secur. Appl."},{"key":"960_CR18","doi-asserted-by":"crossref","unstructured":"Shanmugapriya, D., Dhanya, C., Asha, S., Padmavathi, G., Suthisini, D.N.P.: Cloud insider threat detection using deep learning models. In: 2024 11th International Conference on Computing for Sustainable Global Development (INDIACom), IEEE, pp. 434\u2013438 (2024)","DOI":"10.23919\/INDIACom61295.2024.10498767"},{"key":"960_CR19","unstructured":"CERT, ExactData, L.: CERT synthetic insider threat test dataset. Available at https:\/\/resources.sei.cmu.edu\/library\/asset-view.cfm?assetid=508099 (2016)"},{"issue":"1","key":"960_CR20","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/TNSM.2020.2967721","volume":"17","author":"DC Le","year":"2020","unstructured":"Le, D.C., Zincir-Heywood, N., Heywood, M.I.: Analyzing data granularity levels for insider threat detection using machine learning. IEEE Trans. Netw. Serv. Manag. 17(1), 30\u201344 (2020)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"960_CR21","doi-asserted-by":"crossref","unstructured":"Jiang, W., Tian, Y., Liu, W., Liu, W.: An insider threat detection method based on user behavior analysis. In: International Conference on Intelligent Information Processing, pp. 421\u2013429. Springer (2018)","DOI":"10.1007\/978-3-030-00828-4_43"},{"key":"960_CR22","doi-asserted-by":"publisher","first-page":"103350","DOI":"10.1016\/j.cose.2023.103350","volume":"132","author":"B Racherache","year":"2023","unstructured":"Racherache, B., Shirani, P., Soeanu, A., Debbabi, M.: CPID: Insider threat detection using profiling and cyber-persona identification. Comput. Secur. 132, 103350 (2023)","journal-title":"Comput. Secur."},{"key":"960_CR23","doi-asserted-by":"crossref","unstructured":"Le, D.C., Zincir-Heywood, N., Heywood, M.: Training regime influences to semi-supervised learning for insider threat detection. In: 2021 IEEE Security and Privacy Workshops (SPW), IEEE, pp. 13\u201318 (2021)","DOI":"10.1109\/SPW53761.2021.00010"},{"key":"960_CR24","doi-asserted-by":"crossref","unstructured":"Gavai, G., Sricharan, K., Gunning, D., Rolleston, R., Hanley, J., Singhal, M.: Detecting insider threat from enterprise social and online activity data. In: Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, pp. 13\u201320 (2015)","DOI":"10.1145\/2808783.2808784"},{"issue":"3","key":"960_CR25","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/TCSS.2018.2857473","volume":"5","author":"P Chattopadhyay","year":"2018","unstructured":"Chattopadhyay, P., Wang, L., Tan, Y.-P.: Scenario-based insider threat detection from cyber activities. IEEE Trans. Comput. Soc. Syst. 5(3), 660\u2013675 (2018)","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"960_CR26","unstructured":"Noever, D.: Classifier suites for insider threat detection. Preprint at arXiv:1901.10948 (2019)"},{"key":"960_CR27","doi-asserted-by":"publisher","first-page":"119925","DOI":"10.1016\/j.eswa.2023.119925","volume":"224","author":"P Pal","year":"2023","unstructured":"Pal, P., Chattopadhyay, P., Swarnkar, M.: Temporal feature aggregation with attention for insider threat detection from activity logs. Expert Syst. Appl. 224, 119925 (2023)","journal-title":"Expert Syst. Appl."},{"key":"960_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103761","volume":"220","author":"ZT Sworna","year":"2023","unstructured":"Sworna, Z.T., Mousavi, Z., Babar, M.A.: NLP methods in host-based intrusion detection systems: a systematic review and future directions. J. Netw. Comput. Appl. 220, 103761 (2023)","journal-title":"J. Netw. Comput. Appl."},{"key":"960_CR29","doi-asserted-by":"crossref","unstructured":"Ferreira, P., Le, D.C., Zincir-Heywood, N.: Exploring feature normalization and temporal information for machine learning based insider threat detection. In: 2019 15th International Conference on Network and Service Management (CNSM), IEEE, pp. 1\u20137 (2019)","DOI":"10.23919\/CNSM46954.2019.9012708"},{"key":"960_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107597","volume":"97","author":"MN Al-Mhiqani","year":"2022","unstructured":"Al-Mhiqani, M.N., Ahmad, R., Abidin, Z.Z., Abdulkareem, K.H., Mohammed, M.A., Gupta, D., Shankar, K.: A new intelligent multilayer framework for insider threat detection. Comput. Electr. Eng. 97, 107597 (2022)","journal-title":"Comput. Electr. Eng."},{"key":"960_CR31","doi-asserted-by":"crossref","unstructured":"Al-Mhiqani, M.N., Ahmed, R., Abidin, Z.Z., Isnin, S.: An integrated imbalanced learning and deep neural network model for insider threat detection. Int. J. Adv. Comput. Sci. Appl.12(1) (2021)","DOI":"10.14569\/IJACSA.2021.0120166"},{"key":"960_CR32","unstructured":"Lenzenweger, M.F., Shaw, E.D.: The critical pathway to insider risk model: brief overview and future directions. Count.-Insider Threat Res. Pract.1(1) (2022)"},{"key":"960_CR33","unstructured":"Schoenherr, J.R., Lilja-Lolax, K., Gioe, D.: Multiple approach paths to insider threat (map-it): intentional, ambivalent and unintentional insider threats. Count.-Insider Threat Res. Pract.1(1) (2022)"},{"key":"960_CR34","doi-asserted-by":"publisher","first-page":"819","DOI":"10.1007\/s12243-024-01023-7","volume":"79","author":"Z Wei","year":"2024","unstructured":"Wei, Z., Rauf, U., Mohsen, F.: E-watcher: insider threat monitoring and detection for enhanced security. Ann. Telecommun. 79, 819\u2013831 (2024). https:\/\/doi.org\/10.1007\/s12243-024-01023-7","journal-title":"Ann. Telecommun."},{"issue":"4","key":"960_CR35","doi-asserted-by":"publisher","first-page":"2109","DOI":"10.1002\/nem.2109","volume":"31","author":"DC Le","year":"2021","unstructured":"Le, D.C., Zincir-Heywood, N.: Exploring anomalous behaviour detection and classification for insider threat identification. Int. J. Netw. Manag. 31(4), 2109 (2021)","journal-title":"Int. J. Netw. Manag."},{"key":"960_CR36","doi-asserted-by":"publisher","first-page":"143266","DOI":"10.1109\/ACCESS.2021.3118297","volume":"9","author":"R Nasir","year":"2021","unstructured":"Nasir, R., Afzal, M., Latif, R., Iqbal, W.: Behavioral based insider threat detection using deep learning. IEEE Access 9, 143266\u2013143274 (2021)","journal-title":"IEEE Access"},{"key":"960_CR37","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-030-31967-0_5","volume-title":"Advances in Harmony Search, Soft Computing and Applications","author":"Z Li","year":"2020","unstructured":"Li, Z., Liu, K.: An event based detection of internal threat to information system. In: Kim, J., Geem, Z., Jung, D., Yoo, D., Yadav, A. (eds.) Advances in Harmony Search, Soft Computing and Applications, pp. 44\u201353. Springer, Cham (2020)"},{"issue":"1","key":"960_CR38","doi-asserted-by":"publisher","first-page":"84217","DOI":"10.1371\/journal.pone.0084217","volume":"9","author":"FJ Valverde-Albacete","year":"2014","unstructured":"Valverde-Albacete, F.J., Pel\u00e1ez-Moreno, C.: 100% classification accuracy considered harmful: the normalized information transfer factor explains the accuracy paradox. PLoS ONE 9(1), 84217 (2014)","journal-title":"PLoS ONE"},{"issue":"1","key":"960_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s41044-016-0006-0","volume":"1","author":"IA Gheyas","year":"2016","unstructured":"Gheyas, I.A., Abdallah, A.E.: Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysis. Big Data Anal. 1(1), 1\u201329 (2016)","journal-title":"Big Data Anal."},{"key":"960_CR40","doi-asserted-by":"crossref","unstructured":"Gamachchi, A., Sun, L., Boztas, S.: A graph-based framework for malicious insider threat detection. In: Proceedings of the 50th Hawaii International Conference on System Sciences, pp. 2638\u20132643. http:\/\/hdl.handle.net\/10125\/41475 (2017)","DOI":"10.24251\/HICSS.2017.319"},{"key":"960_CR41","doi-asserted-by":"crossref","unstructured":"Amo, L., Sanders, S., Gaia, J., Singh, R., Murray, D., Sanders, G.L., Upadhyaya, S.: Economic incentives and perceptions as critical factors for understanding insider hacking behavior. In: Proceedings of the 57th Hawaii International Conference on System Sciences, pp. 3223\u20133226. https:\/\/hdl.handle.net\/10125\/106773 (2024)","DOI":"10.24251\/HICSS.2024.390"},{"key":"960_CR42","unstructured":"Fox, J.: The new insider threat: how commercially available data can be used to target and persuade. Managing Insider Risk and Organizational Resilience (MIROR) Summer 2024 (2024)"},{"key":"960_CR43","doi-asserted-by":"crossref","unstructured":"Mohsen, F., Rauf, U., Lavric, V., Kokushkin, A., Wei, Z., Martinez, A.: On identification of intrusive applications: a step towards heuristics-based adaptive security policy. IEEE Access (2024)","DOI":"10.1109\/ACCESS.2024.3373202"},{"key":"960_CR44","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1016\/j.future.2020.11.009","volume":"117","author":"U Rauf","year":"2021","unstructured":"Rauf, U., Shehab, M., Qamar, N., Sameen, S.: Formal approach to thwart against insider attacks: a bio-inspired auto-resilient policy regulation framework. Futur. Gener. Comput. Syst. 117, 412\u2013425 (2021)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"960_CR45","unstructured":"Hunter, M., Cisler, D., Fauth, W., Kennedy, K., Rose, A.: Data analysis workbook for the insider threat community: A collaborative workbook. Technical Report PERSEREC-PA-23-04, Defense Personnel and Security Research Center (PERSEREC), Monterey, CA (November 2023)"},{"key":"960_CR46","unstructured":"Hunter, M., Fauth, W., Cisler, D., Rose, A.: Developing a data analysis plan for the insider threat community. Technical Report PERSEREC-RN-23-05, Defense Personnel and Security Research Center (PERSEREC), Monterey, CA (November 2023)"},{"key":"960_CR47","doi-asserted-by":"crossref","unstructured":"Moore, A.P., Cappelli, D.M., Caron, T.C., Shaw, E., Spooner, D., Trzeciak, R.F.: A preliminary model of insider theft of intellectual property. Technical Report, Carnegie-Mellon Univ Pittsburgh Pa Software Engineering Inst (2011)","DOI":"10.21236\/ADA589594"},{"key":"960_CR48","doi-asserted-by":"crossref","unstructured":"Glasser, J., Lindauer, B.: Bridging the gap: a pragmatic approach to generating insider threat data. In: 2013 IEEE Security and Privacy Workshops, pp. 98\u2013104, IEEE (2013)","DOI":"10.1109\/SPW.2013.37"},{"key":"960_CR49","unstructured":"Japkowicz, N.: The class imbalance problem: significance and strategies. In: Proc. of the Int\u2019l Conf. on Artificial Intelligence, vol. 56, pp. 111\u2013117 (2000)"},{"key":"960_CR50","unstructured":"Drummond, C., Holte, R.C., et al.: C4. 5, class imbalance, and cost sensitivity: why under-sampling beats over-sampling. In: Workshop on Learning from Imbalanced Datasets II, vol. 11, pp. 1\u20138 (2003)"},{"key":"960_CR51","unstructured":"Greitzer, F.L., Kliner, R.A., Chan, S.: Temporal effects of contributing factors in insider risk assessment: Insider threat indicator decay characteristics. In: Workshop on Research for Insider Threat (WRIT) at the Annual Computer Security Applications Conference (ACSAC). ACM, Austin, Texas, USA (2022). https:\/\/www.acsac.org\/2022\/workshops\/writ\/"},{"key":"960_CR52","doi-asserted-by":"crossref","unstructured":"Gribbon, K.T., Bailey, D.G.: A novel approach to real-time bilinear interpolation. In: Proceedings. DELTA 2004. Second IEEE International Workshop on Electronic Design, Test and Applications, IEEE, pp. 126\u2013131 (2004)","DOI":"10.1109\/DELTA.2004.10055"},{"issue":"1","key":"960_CR53","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-019-0263-7","volume":"6","author":"M Hashemi","year":"2019","unstructured":"Hashemi, M.: Enlarging smaller images before inputting into convolutional neural network: zero-padding vs. interpolation. J. Big Data 6(1), 1\u201313 (2019)","journal-title":"J. Big Data"},{"key":"960_CR54","doi-asserted-by":"crossref","unstructured":"Talebi, H., Milanfar, P.: Learning to resize images for computer vision tasks. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 497\u2013506 (2021)","DOI":"10.1109\/ICCV48922.2021.00055"},{"issue":"11","key":"960_CR55","doi-asserted-by":"publisher","first-page":"150","DOI":"10.4236\/jcc.2021.911010","volume":"9","author":"D Hirahara","year":"2021","unstructured":"Hirahara, D., Takaya, E., Kadowaki, M., Kobayashi, Y., Ueda, T.: Effect of the pixel interpolation method for downsampling medical images on deep learning accuracy. J. Comput. Commun. 9(11), 150\u2013156 (2021)","journal-title":"J. Comput. Commun."}],"container-title":["International Journal of Data Science and Analytics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41060-025-00960-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s41060-025-00960-3","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41060-025-00960-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T09:35:39Z","timestamp":1773480939000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s41060-025-00960-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,26]]},"references-count":55,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,6]]}},"alternative-id":["960"],"URL":"https:\/\/doi.org\/10.1007\/s41060-025-00960-3","relation":{},"ISSN":["2364-415X","2364-4168"],"issn-type":[{"value":"2364-415X","type":"print"},{"value":"2364-4168","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,26]]},"assertion":[{"value":"16 May 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"The authors declare no Conflict of interest.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"13"}}