{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T08:19:18Z","timestamp":1770970758910,"version":"3.50.1"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T00:00:00Z","timestamp":1746748800000},"content-version":"vor","delay-in-days":38,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J BANK FINANC TECHNOL"],"published-print":{"date-parts":[[2025,4]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Online banking systems have become an integral part of our daily lives, offering access to financial services through Internet technologies and applications, however, as these systems grow in prevalence, they also introduce significant security and privacy challenges. These systems can be exposed to various cybersecurity threats that can result in data breaches, compromise of sensitive financial information, reputational damage, and significant operational disruptions. The existing model designed to ensure the security of consumers and service providers often fails to address the unique security and privacy challenges posed by banking environments. This paper proposes an integrated management framework based on threat and risk models, specifically designed for online banking systems. The framework incorporates a comprehensive risk management process and systematic assessment techniques while considering security features attributed to the banking environment, threat landscapes, and accessible information within the banking. During the threat identification and vulnerability analysis phases, potential attack scenarios and their possible impacts are evaluated using pre-defined procedures while considering the context. The assessment process quantifies cybersecurity risks, facilitating the appropriate mitigation strategies to address identified threats and risks. The framework\u2019s applicability has been evaluated to determine its potential for effective real-world implementation in online banking systems. The evaluation addressed the security and privacy challenges of digital banking, and its ability to integrate with existing technologies and regulatory requirements.<\/jats:p>","DOI":"10.1007\/s42786-025-00056-3","type":"journal-article","created":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T14:12:37Z","timestamp":1746799957000},"page":"85-104","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["An integrated cyber security risk management framework for online banking systems"],"prefix":"10.1007","volume":"9","author":[{"given":"Yiu Ting Yan","family":"Azura","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1707-018X","authenticated-orcid":false,"given":"Muhammad Ajmal","family":"Azad","sequence":"additional","affiliation":[]},{"given":"Yussuf","family":"Ahmed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,9]]},"reference":[{"key":"56_CR1","unstructured":"Statista (2022) Online banking usage in Great Britain from 2007 to 2022. https:\/\/www.statista.com\/statistics\/286273\/internet-banking-penetration-in-great-britain\/. Accessed 12 May 2022"},{"issue":"3","key":"56_CR2","first-page":"25","volume":"2","author":"MM Alhaddad","year":"2018","unstructured":"Alhaddad MM (2018) Artificial intelligence in banking industry: a review on fraud detection, credit management, and document processing. ResearchBerg Rev Sci Technol 2(3):25\u201346","journal-title":"ResearchBerg Rev Sci Technol"},{"key":"56_CR3","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.jeconbus.2018.07.003","volume":"100","author":"I Anagnostopoulos","year":"2018","unstructured":"Anagnostopoulos I (2018) Fintech and regtech: impact on regulators and banks. J Econ Bus 100:7\u201325","journal-title":"J Econ Bus"},{"issue":"6","key":"56_CR4","first-page":"3727","volume":"29","author":"V Dubey","year":"2020","unstructured":"Dubey V, Sonar R, Mohanty A (2020) Fintech, regtech and contactless payments through the lens of covid 19 times. Int J Adv Sci Technol 29(6):3727\u20133734","journal-title":"Int J Adv Sci Technol"},{"issue":"1","key":"56_CR5","first-page":"43","volume":"17","author":"P Dzhaparov","year":"2020","unstructured":"Dzhaparov P (2020) Application of blockchain and artificial intelligence in bank risk management. Bank Risk Manag J 17(1):43\u201357","journal-title":"Bank Risk Manag J"},{"key":"56_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2020.101487","volume":"64","author":"F Li","year":"2021","unstructured":"Li F, Lu H, Hou M, Cui K, Darbandi M (2021) Customer satisfaction with bank services: the role of cloud services, security, e-learning and service quality. Technol Soc 64:101487","journal-title":"Technol Soc"},{"key":"56_CR7","doi-asserted-by":"crossref","unstructured":"Singh M, Tanwar KS, Srivastava VM (2018) Cloud computing adoption challenges in the banking industry. In: 2018 International conference on advances in big data, computing and data communication systems (icABCD), IEEE. pp 1\u20135","DOI":"10.1109\/ICABCD.2018.8465412"},{"key":"56_CR8","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1108\/IJBM-10-2014-0139","volume":"34","author":"M Amin","year":"2016","unstructured":"Amin M (2016) Internet banking service quality and its implication on e-customer satisfaction and e-customer loyalty. Int J Bank Market 34:280\u2013306","journal-title":"Int J Bank Market"},{"key":"56_CR9","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1108\/02652321011054963","volume":"28","author":"AYL Chong","year":"2010","unstructured":"Chong AYL, Ooi KB, Lin B, Tan BI (2010) Online banking adoption: an empirical analysis. Int J Bank Market 28:267\u2013287","journal-title":"Int J Bank Market"},{"key":"56_CR10","volume-title":"Digital banking manifesto: the end of banks?","author":"A Lipton","year":"2016","unstructured":"Lipton A, Shrier D, Pentland A (2016) Digital banking manifesto: the end of banks? Massachusetts Institute of Technology, Cambridge"},{"key":"56_CR11","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1108\/IJBM-11-2016-0181","volume":"36","author":"CI Mbama","year":"2018","unstructured":"Mbama CI, Ezepue PO (2018) Digital banking, customer experience and bank financial performance: UK customers\u2019 perceptions. Int J Bank Mark 36:230\u2013255","journal-title":"Int J Bank Mark"},{"issue":"2","key":"56_CR12","doi-asserted-by":"publisher","first-page":"32","DOI":"10.3390\/ijfs8020032","volume":"8","author":"A Mehdiabadi","year":"2020","unstructured":"Mehdiabadi A, Tabatabeinasab M, Spulbar C, KarbassiYazdi A, Birau R (2020) Are we ready for the challenge of banks 4.0? Designing a roadmap for banking systems in industry 4.0. Int J Financ Stud 8(2):32","journal-title":"Int J Financ Stud"},{"key":"56_CR13","unstructured":"McKinsey &Company (2015) The future of bank risk management. https:\/\/www.mckinsey.com\/business-functions\/risk-and-resilience\/our-insights\/the-future-of-bank-risk-management. Accessed 13 May 2022"},{"key":"56_CR14","doi-asserted-by":"publisher","unstructured":"Tursoy T (2018) Risk management process in banking industry. https:\/\/doi.org\/10.13140\/RG.2.2.14737.74085","DOI":"10.13140\/RG.2.2.14737.74085"},{"key":"56_CR15","doi-asserted-by":"publisher","first-page":"90","DOI":"10.17512\/pjms.2016.13.2.09","volume":"13","author":"N Konovalova","year":"2016","unstructured":"Konovalova N, Kristovska I, Kudinska M (2016) Credit risk management in commercial banks. Polish J Manag Stud 13:90\u2013100","journal-title":"Polish J Manag Stud"},{"key":"56_CR16","doi-asserted-by":"crossref","unstructured":"Monnin P (2018) Integrating climate risks into credit risk assessment-current methodologies and the case of central banks corporate bond purchases. Council on Economic Policies, Discussion Note 4","DOI":"10.2139\/ssrn.3350918"},{"issue":"1","key":"56_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40854-019-0121-9","volume":"5","author":"S Moradi","year":"2019","unstructured":"Moradi S, Mokhatab Rafiei F (2019) A dynamic credit risk assessment model with data mining techniques: evidence from Iranian banks. Financ Innov 5(1):1\u201327","journal-title":"Financ Innov"},{"issue":"1","key":"56_CR18","doi-asserted-by":"publisher","first-page":"29","DOI":"10.3390\/risks7010029","volume":"7","author":"M Leo","year":"2019","unstructured":"Leo M, Sharma S, Maddulety K (2019) Machine learning in banking risk management: a literature review. Risks 7(1):29","journal-title":"Risks"},{"key":"56_CR19","unstructured":"Stojanovi\u0107 D, Krsti\u0107 MSM (2017) Modern approaches and challenges of risk management in electronic banking. Unspecified journal"},{"key":"56_CR20","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/160\/1\/012107","volume":"160","author":"FN Mahmadi","year":"2016","unstructured":"Mahmadi FN, Zaaba ZF, Osman A (2016) Computer security issues in online banking: an assessment from the context of usable security. IOP Conf Ser Mater Sci Eng 160:012107","journal-title":"IOP Conf Ser Mater Sci Eng"},{"issue":"4","key":"56_CR21","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1515\/orga-2016-0022","volume":"49","author":"A Svilar","year":"2016","unstructured":"Svilar A, Zupan\u010di\u010d J (2016) User experience with security elements in internet and mobile banking. Organizacija 49(4):251\u2013260","journal-title":"Organizacija"},{"issue":"1","key":"56_CR22","doi-asserted-by":"publisher","first-page":"013","DOI":"10.1093\/cybsec\/tyz013","volume":"5","author":"B Dupont","year":"2019","unstructured":"Dupont B (2019) The cyber-resilience of financial institutions: significance and applicability. J Cybersecur 5(1):013","journal-title":"J Cybersecur"},{"key":"56_CR23","doi-asserted-by":"crossref","unstructured":"Chen S, Fan L, Meng G, Su T, Xue M, Xue Y, Liu Y, Xu L (2020) An empirical assessment of security risks of global android banking apps. In: 2020 IEEE\/ACM 42nd international conference on software engineering (ICSE), pp 1310\u20131322","DOI":"10.1145\/3377811.3380417"},{"key":"56_CR24","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1016\/j.chb.2014.05.046","volume":"38","author":"NAG Arachchilage","year":"2014","unstructured":"Arachchilage NAG, Love S (2014) Security awareness of computer users: a phishing threat avoidance perspective. Comput Hum Behav 38:304\u2013312","journal-title":"Comput Hum Behav"},{"key":"56_CR25","doi-asserted-by":"crossref","unstructured":"Alghazo JM, Kazmi Z, Latif G (2017) Cyber security analysis of internet banking in emerging countries: user and bank perspectives. In: 2017 4th IEEE international conference on engineering technologies and applied sciences (ICETAS). IEEE, pp 1\u20136","DOI":"10.1109\/ICETAS.2017.8277910"},{"key":"56_CR26","doi-asserted-by":"crossref","unstructured":"Dhoot A, Nazarov AN, Koupaei ANA (2020) A security risk model for online banking system. In: 2020 Systems of signals generating and processing in the field of on board communications. IEEE, pp 1\u20134","DOI":"10.1109\/IEEECONF48371.2020.9078655"},{"key":"56_CR27","doi-asserted-by":"crossref","unstructured":"Bakar KAA, Haron GR (2014) Adaptive authentication based on analysis of user behavior. In: 2014 Science and information conference. IEEE, pp 601\u2013606","DOI":"10.1109\/SAI.2014.6918248"},{"key":"56_CR28","doi-asserted-by":"publisher","first-page":"70","DOI":"10.17512\/pjms.2019.19.1.06","volume":"19","author":"Y Bilan","year":"2019","unstructured":"Bilan Y, Rubanov P, Vasylieva TA, Lyeonov S (2019) The influence of industry 4.0 on financial services: determinants of alternative finance development. Polish J Manag Stud 19:70\u201393","journal-title":"Polish J Manag Stud"},{"issue":"3","key":"56_CR29","first-page":"1","volume":"54","author":"HS Yoon","year":"2014","unstructured":"Yoon HS, Occe\u00f1a LUIS (2014) Impacts of customers\u2019 perceptions on internet banking use with a smart phone. J Comput Inf Syst 54(3):1\u20139","journal-title":"J Comput Inf Syst"},{"issue":"02","key":"56_CR30","doi-asserted-by":"publisher","first-page":"2150019","DOI":"10.1142\/S2424786321500195","volume":"8","author":"K Najaf","year":"2021","unstructured":"Najaf K, Mostafiz MI, Najaf R (2021) Fintech firms and banks sustainability: why cybersecurity risk matters? Int J Financ Eng 8(02):2150019","journal-title":"Int J Financ Eng"},{"issue":"7","key":"56_CR31","first-page":"1523","volume":"14","author":"AI Al-Alawi","year":"2020","unstructured":"Al-Alawi AI, Al-Bassam MSA (2020) The significance of cybersecurity system in helping managing risk in banking and financial sector. J Xidian Univ 14(7):1523\u20131536","journal-title":"J Xidian Univ"},{"key":"56_CR32","doi-asserted-by":"publisher","unstructured":"Ngalo T, Xiao H, Christianson B, Zhang Y (2018) Threat analysis of software agents in online banking and payments. In: 2018 IEEE 16th international conference on dependable, autonomic and secure computing, 16th international conference on pervasive intelligence and computing, 4th international conference on big data intelligence and computing and cyber science and technology congress (DASC\/PiCom\/DataCom\/CyberSciTech). pp 716\u2013723. https:\/\/doi.org\/10.1109\/DASC\/PiCom\/DataCom\/CyberSciTec.2018.00125","DOI":"10.1109\/DASC\/PiCom\/DataCom\/CyberSciTec.2018.00125"},{"key":"56_CR33","doi-asserted-by":"publisher","first-page":"2172","DOI":"10.1016\/j.matpr.2021.11.121","volume":"51","author":"S Vinoth","year":"2022","unstructured":"Vinoth S, Vemula HL, Haralayya B, Mamgain P, Hasan MF, Naved M (2022) Application of cloud computing in banking and e-commerce and related security threats. Mater Today Proc 51:2172\u20132175","journal-title":"Mater Today Proc"},{"issue":"2","key":"56_CR34","first-page":"198","volume":"4","author":"J Choubey","year":"2013","unstructured":"Choubey J, Choubey B (2013) Secure user authentication in internet banking: a qualitative survey. Int J Innov Manag Technol 4(2):198","journal-title":"Int J Innov Manag Technol"},{"key":"56_CR35","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/769\/1\/012061","volume":"769","author":"WA Hammood","year":"2020","unstructured":"Hammood WA, Abdullah Arshah R, Hammood O, Mohamad Asmara S, Al-Sharafi MA, Muttaleb A (2020) A review of user authentication model for online banking system based on mobile IMEI number. IOP Conf Ser Mater Sci Eng 769:012061. https:\/\/doi.org\/10.1088\/1757-899X\/769\/1\/012061","journal-title":"IOP Conf Ser Mater Sci Eng"},{"key":"56_CR36","doi-asserted-by":"crossref","unstructured":"Lupu C, G\u0103itan VG, Lupu V (2015) Security enhancement of internet banking applications by using multimodal biometrics. In: 2015 IEEE 13th international symposium on applied machine intelligence and informatics (SAMI). IEEE, pp 47\u201352","DOI":"10.1109\/SAMI.2015.7061904"},{"key":"56_CR37","doi-asserted-by":"crossref","unstructured":"Priya R, Tamilselvi V, Rameshkumar GP (2014) A novel algorithm for secure internet banking with fingerprint recognition. In: 2014 International conference on embedded systems (ICES). IEEE, pp 104\u2013109","DOI":"10.1109\/EmbeddedSys.2014.6953099"},{"key":"56_CR38","unstructured":"FCA (2022) deadline extension for strong customer authentication. https:\/\/www.fca.org.uk\/news\/statements\/deadline-extension-strong-customer-authentication. Accessed 18 May 2022"},{"issue":"2","key":"56_CR39","first-page":"271","volume":"8","author":"T Xin","year":"2014","unstructured":"Xin T, Xiaofang B (2014) Online banking security analysis based on stride threat model. Int J Secur Appl 8(2):271\u2013282","journal-title":"Int J Secur Appl"},{"key":"56_CR40","doi-asserted-by":"publisher","unstructured":"Monteuuis J-P, Boudguiga A, Zhang J, Labiod H, Servel A, Urien P (2018) SARA: security automotive risk analysis method. In: Proceedings of the 4th ACM workshop on cyber-physical system security. CPSS \u201918, pp 3\u201314. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/3198458.3198465","DOI":"10.1145\/3198458.3198465"},{"key":"56_CR41","unstructured":"Owasp.org (2022) OWASP Top Ten | OWASP Foundation. https:\/\/owasp.org\/www-project-top-ten\/. Accessed 19 Jun 2022"},{"key":"56_CR42","doi-asserted-by":"publisher","DOI":"10.1007\/s42154-021-00140-6","author":"Y Wang","year":"2021","unstructured":"Wang Y, Wang Y, Qin H, Ji H, Zhang Y, Wang J (2021) A systematic risk assessment framework of automotive cybersecurity. Autom Innov. https:\/\/doi.org\/10.1007\/s42154-021-00140-6","journal-title":"Autom Innov"},{"issue":"4","key":"56_CR43","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1049\/iet-cps.2018.5079","volume":"4","author":"HI Kure","year":"2019","unstructured":"Kure HI, Islam S (2019) Assets focus risk management framework for critical infrastructure cybersecurity risk management. IET Cyber Phys Syst Theory Appl 4(4):332\u2013340","journal-title":"IET Cyber Phys Syst Theory Appl"},{"issue":"6","key":"56_CR44","doi-asserted-by":"publisher","first-page":"898","DOI":"10.3390\/app8060898","volume":"8","author":"HI Kure","year":"2018","unstructured":"Kure HI, Islam S, Razzaque MA (2018) An integrated cyber security risk management approach for a cyber-physical system. Appl Sci 8(6):898","journal-title":"Appl Sci"},{"key":"56_CR45","doi-asserted-by":"publisher","unstructured":"Radanliev P, Roure D, Nurse J, Nicolescu R, Huth M, Cannady S, Montalvo R (2019) Cyber risk impact assessment\u2014assessing the risk from the IoT to the digital economy. https:\/\/doi.org\/10.20944\/preprints201903.0109.v1","DOI":"10.20944\/preprints201903.0109.v1"},{"key":"56_CR46","doi-asserted-by":"publisher","unstructured":"Radanliev P, De Roure D, Nurse J, Nicolescu R, Huth M, Cannady S, Montalvo RM (2018) Integration of cyber security frameworks, models and approaches for building design principles for the internet-of-things in industry 4.0. https:\/\/doi.org\/10.1049\/cp.2018.0041","DOI":"10.1049\/cp.2018.0041"},{"key":"56_CR47","unstructured":"Ar\u0131kan A, Dikmen T, Birg\u00f6n\u00fcl MT (2009) A prototype risk management decision support tool for construction projects"},{"key":"56_CR48","doi-asserted-by":"publisher","DOI":"10.1111\/risa.12891","author":"A Ganin","year":"2017","unstructured":"Ganin A, Quach P, Panwar M, Collier Z, Keisler J, Marchese D (2017) Multicriteria decision framework for cybersecurity risk assessment and management. Risk Anal. https:\/\/doi.org\/10.1111\/risa.12891","journal-title":"Risk Anal"},{"key":"56_CR49","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/j.cose.2016.12.008","volume":"65","author":"J Meszaros","year":"2017","unstructured":"Meszaros J, Buchalcevova A (2017) Introducing OSSF: a framework for online service cybersecurity risk management. Comput Secur 65:300\u2013313","journal-title":"Comput Secur"},{"key":"56_CR50","unstructured":"Csrc.nist.gov (2022) NIST risk management framework. https:\/\/csrc.nist.gov\/projects\/risk-management\/about-rmf. Accessed 2 Jul 2022"},{"key":"56_CR51","unstructured":"ISO (2013) ISO\/IEC 27001\u2014information security management. https:\/\/www.iso.org\/isoiec-27001-information-security.html. Accessed 2 Jul 2022"},{"key":"56_CR52","unstructured":"ISO (2018) ISO 31000\u2014risk management. https:\/\/www.iso.org\/iso-31000-risk-management.html. Accessed 2 Jul 2022"},{"key":"56_CR53","doi-asserted-by":"crossref","unstructured":"Fahrurozi M, Tarigan SA, Tanjung MA, Mutijarsa K (2020) The use of ISO\/IEC 27005: 2018 for strengthening information security management (a case study at data and information center of ministry of defence). In: 2020 12th International conference on information technology and electrical engineering (ICITEE). IEEE, pp 86\u201391","DOI":"10.1109\/ICITEE49829.2020.9271748"},{"key":"56_CR54","unstructured":"ISO (2018) ISO\/IEC 27005:2018. https:\/\/www.iso.org\/standard\/75281.html. Accessed 2 Jul 2022"},{"key":"56_CR55","unstructured":"Csrc.nist.gov (2022) Glossary CSRC. https:\/\/csrc.nist.gov\/glossary. Accessed 11 Jun 2022"},{"key":"56_CR56","doi-asserted-by":"publisher","DOI":"10.4172\/1204-5357.1000120","author":"LT Khrais","year":"2015","unstructured":"Khrais LT (2015) Highlighting the vulnerabilities of online banking system. J Internet Bank Commer. https:\/\/doi.org\/10.4172\/1204-5357.1000120","journal-title":"J Internet Bank Commer"},{"key":"56_CR57","first-page":"15","volume":"13","author":"S Azad","year":"2013","unstructured":"Azad S, Jain K (2013) CAPTCHA: attacks and weaknesses against OCR technology. Glob J Comput Sci Technol 13:15\u201317","journal-title":"Glob J Comput Sci Technol"},{"key":"56_CR58","doi-asserted-by":"publisher","unstructured":"Edge K, Raines R, Grimaila M, Baldwin R, Bennington R, Reuter C (2007) The use of attack and protection trees to analyze security for an online banking system. In: 2007 40th Annual Hawaii international conference on system sciences (HICSS\u201907), pp 144\u2013144. https:\/\/doi.org\/10.1109\/HICSS.2007.558","DOI":"10.1109\/HICSS.2007.558"},{"key":"56_CR59","unstructured":"Cwe.mitre.org (2022) CWE\u20132022 CWE top 25 most dangerous software weaknesses. https:\/\/cwe.mitre.org\/top25\/archive\/2022\/2022_cwe_top25.html. Accessed 23 Jun 2022"},{"key":"56_CR60","unstructured":"CIS (2022) The 18 CIS controls. https:\/\/www.cisecurity.org\/controls\/cis-controls-list. Accessed 24 Jul 2022"}],"container-title":["Journal of Banking and Financial Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42786-025-00056-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42786-025-00056-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42786-025-00056-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T13:12:03Z","timestamp":1765804323000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42786-025-00056-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4]]},"references-count":60,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,4]]}},"alternative-id":["56"],"URL":"https:\/\/doi.org\/10.1007\/s42786-025-00056-3","relation":{},"ISSN":["2524-7956","2524-7964"],"issn-type":[{"value":"2524-7956","type":"print"},{"value":"2524-7964","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4]]},"assertion":[{"value":"25 March 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 November 2025","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Update","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The society logo has been updated.","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}