{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T02:12:06Z","timestamp":1768270326664,"version":"3.49.0"},"reference-count":77,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T00:00:00Z","timestamp":1704672000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T00:00:00Z","timestamp":1704672000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["AI Ethics"],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1007\/s43681-023-00394-2","type":"journal-article","created":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T13:02:51Z","timestamp":1704718971000},"page":"15-25","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["An overview of key trustworthiness attributes and KPIs for trusted ML-based systems engineering"],"prefix":"10.1007","volume":"4","author":[{"given":"Juliette","family":"Mattioli","sequence":"first","affiliation":[]},{"given":"Henri","family":"Sohier","sequence":"additional","affiliation":[]},{"given":"Agn\u00e8s","family":"Delaborde","sequence":"additional","affiliation":[]},{"given":"Kahina","family":"Amokrane-Ferka","sequence":"additional","affiliation":[]},{"given":"Afef","family":"Awadid","sequence":"additional","affiliation":[]},{"given":"Zakaria","family":"Chihani","sequence":"additional","affiliation":[]},{"given":"Souhaiel","family":"Khalfaoui","sequence":"additional","affiliation":[]},{"given":"Gabriel","family":"Pedroza","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,8]]},"reference":[{"key":"394_CR1","unstructured":"ALTAI: Assessment List for Trustworthy Artificial Intelligence (ALTAI). Technical report, High-Level Expert Group on Artificial Intelligence, European Commission (2019)"},{"key":"394_CR2","doi-asserted-by":"crossref","unstructured":"Anderson, P., He, X., Buehler, C., Teney, D., Johnson, M., Gould, S., Zhang, L.: Bottom-Up and Top-Down Attention for Image Captioning and Visual Question Answering. In 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 6077\u20136086 (2018)","DOI":"10.1109\/CVPR.2018.00636"},{"key":"394_CR3","unstructured":"ANSI\/ IEEE Std 729-1983. IEEE Standard Glossary of Software Engineering Terminology (1983)"},{"issue":"1","key":"394_CR4","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A Avizienis","year":"2004","unstructured":"Avizienis, A., Laprie, J.-C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. Dependable Secure Comput. 1(1), 11\u201333 (2004)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"394_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24106-7","volume-title":"Data and information quality","author":"C Batini","year":"2016","unstructured":"Batini, C., Scannapieco, M.: Data and information quality. Springer International Publishing (2016)"},{"key":"394_CR6","first-page":"1","volume-title":"Artificial intelligence paradigms for smart cyber-physical systems","author":"J Bosch","year":"2021","unstructured":"Bosch, J., Olsson, H.H., Crnkovic, I.: Engineering AI systems: a research agenda. In: Artificial intelligence paradigms for smart cyber-physical systems, pp. 1\u201319. IGI Global (2021)"},{"key":"394_CR7","unstructured":"Braunschweig, B., Gelin, R., Terrier, F.: The wall of safety for AI: approaches in the Confiance.ai program. In Proceedings of the Workshop on Artificial Intelligence Safety 2022 (SafeAI 2022), volume 3087 of CEUR Workshop Proceedings. CEUR-WS.org (2022)"},{"issue":"6","key":"394_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3277666","volume":"51","author":"J-H Cho","year":"2019","unstructured":"Cho, J.-H., Xu, S., Hurley, P.M., Mackay, M., Benjamin, T., Beaumont, M.: Stram: measuring the trustworthiness of computer-based systems. ACM Comput Surv (CSUR) 51(6), 1\u201347 (2019)","journal-title":"ACM Comput Surv (CSUR)"},{"key":"394_CR9","unstructured":"Confiance.ai, and all.: Algorithm Engineering including Algorithm evaluation and KPIs - State of the Art. Technical report, Confiance.ai Program (2021)"},{"key":"394_CR10","unstructured":"Confiance.ai, et\u00a0al.: Towards the engineering of trustworthy AI applications for critical systems\u2014the Confiance.ai program (2022)"},{"key":"394_CR11","unstructured":"Costabel, P., del Carmen, V.: Data freshness and data accuracy: A state of the art. Reportes T\u00e9cnicos 06-13 (2006)"},{"key":"394_CR12","unstructured":"Delseny, H., Gabreau, C., Gauffriau, A., Beaudouin, B., Ponsolle, L., Alecu, L., Bonnin, H., Beltran, B., Duchel, D., Ginestet, J.-B., et\u00a0al.: White Paper Machine Learning in Certified Systems. arXiv preprint arXiv:2103.10529 (2021)"},{"key":"394_CR13","doi-asserted-by":"crossref","unstructured":"Demetrescu, C., Finocchi, I., Italiano, G.F.: Algorithm engineering. In Current Trends in Theoretical Computer Science: The Challenge of the New Century Vol 1: Algorithms and Complexity Vol 2: Formal Models and Semantics, 83\u2013104. World Scientific (2004)","DOI":"10.1142\/9789812562494_0006"},{"key":"394_CR14","unstructured":"EASA: Concept Paper First Usable Guidance for Level 1 Machine Learning Applications (2021)"},{"key":"394_CR15","unstructured":"ED-76A: Standards for processing aeronautical Data (2015)"},{"key":"394_CR16","unstructured":"EN 50129: Railway applications\u2014communication, signalling and processing systems\u2014safety-related electronic systems for signalling (2018)"},{"key":"394_CR17","unstructured":"ETSI: Securing Artificial Intelligence (SAI); Mitigation Strategy Report (2021)"},{"key":"394_CR18","unstructured":"EUROCAE WG114 - SAE G34: A joint standardization initiative to support Artificial Intelligence revolution in aeronautics (2021)"},{"key":"394_CR19","unstructured":"European Commission: Proposal for a Regulation of the European Parliament and of the Council laying down Harmonised Rules on Artificial Intelligence (Artificial Intelligence Act) and Amending Certain Union Legislative Acts (2021)"},{"key":"394_CR20","doi-asserted-by":"publisher","first-page":"160845777X","DOI":"10.1007\/978-3-031-01892-3","volume-title":"Foundations of data quality management","author":"W Fan","year":"2012","unstructured":"Fan, W., Geerts, F.: Foundations of data quality management, p. 160845777X. Morgan & Claypool Publishers, ISBN (2012)"},{"key":"394_CR21","doi-asserted-by":"crossref","unstructured":"Firmani, D., Mecella, M., Scannapieco, M., Batini, C.: On the Meaningfulness of \u201cBig Data Quality\u201d (Invited Paper). Data Science and Engineering, 1 (2016)","DOI":"10.1007\/s41019-015-0004-7"},{"issue":"383","key":"394_CR22","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1080\/01621459.1983.10478008","volume":"78","author":"EB Fowlkes","year":"1983","unstructured":"Fowlkes, E.B., Mallows, C.L.: A method for comparing two hierarchical clusterings. J. Am. Stat. Assoc. 78(383), 553\u2013569 (1983)","journal-title":"J. Am. Stat. Assoc."},{"key":"394_CR23","unstructured":"Ge, M., Helfert, M.: A Framework to Assess Decision Quality Using Information Quality Dimensions. In ICIQ, 455\u2013466 (2006)"},{"key":"394_CR24","unstructured":"Gong, Z., Zhong, P., Hu, W.: Diversity in Machine Learning. CoRR. arxiv:1807.01477 (2018)"},{"key":"394_CR25","unstructured":"Halstead, M.H.: Halstead. Elements of Software Science (1977)"},{"key":"394_CR26","unstructured":"Hamon, R., Junklewitz, H., Sanchez, I.: Robustness and explainability of artificial intelligence. Publications Office of the European Union (2020)"},{"key":"394_CR27","unstructured":"Harradon, M., Druce, J., Ruttenberg, B.E.: Causal Learning and Explanation of Deep Neural Networks via Autoencoded Activations. CoRR. arxiv:1802.00541 (2018)"},{"key":"394_CR28","unstructured":"Heinrich, B., Helfert, M.: Analyzing Data Quality Investments in CRM-A model-based approach. In International Conference on Information Quality (ICIQ) (2003)"},{"issue":"2","key":"394_CR29","first-page":"1","volume":"9","author":"B Heinrich","year":"2018","unstructured":"Heinrich, B., Hristova, D., Klier, M., Schiller, A., Szubartowicz, M.: Requirements for data quality metrics. J Data Inform Quality (JDIQ) 9(2), 1\u201332 (2018)","journal-title":"J Data Inform Quality (JDIQ)"},{"key":"394_CR30","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-46493-0_1","volume-title":"Computer Vision - ECCV 2016","author":"LA Hendricks","year":"2016","unstructured":"Hendricks, L.A., Akata, Z., Rohrbach, M., Donahue, J., Schiele, B., Darrell, T.: Generating visual explanations. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) Computer Vision - ECCV 2016, pp. 3\u201319. Springer International Publishing (2016)"},{"key":"394_CR31","volume-title":"IEEE standard glossary of software engineering terminology","author":"IEEE","year":"1990","unstructured":"IEEE: IEEE standard glossary of software engineering terminology. New York Inst. Electr. Electron, Ehgineers (1990)"},{"key":"394_CR32","unstructured":"ISO 9241-210. Ergonomics of human-system interaction - Part 210: Human-centred design for interactive systems (2019)"},{"key":"394_CR33","unstructured":"ISO\/IEC 25010. Systems and software engineering\u2014systems and software quality requirements and evaluation (SQuaRE)\u2014system and software quality models (2011)"},{"key":"394_CR34","unstructured":"ISO\/IEC 25012. Software engineering\u2014software product quality requirements and evaluation (SQuaRE)\u2014data quality model (2008)"},{"key":"394_CR35","unstructured":"ISO\/IEC 25022. Systems and software engineering\u2014systems and software quality requirements and evaluation (SQuaRE)\u2014measurement of quality in use (2016)"},{"key":"394_CR36","unstructured":"ISO\/IEC 25023. Systems and software engineering\u2014systems and software quality requirements and evaluation (SQuaRE)\u2014measurement of system and software product quality (2015)"},{"key":"394_CR37","unstructured":"ISO\/IEC CD TR 5469. 202X. Artificial intelligence\u2014functional safety and AI systems"},{"key":"394_CR38","unstructured":"ISO\/IEC DIS 22989. Information technology\u2014artificial intelligence\u2014artificial intelligence concepts and terminology (2021)"},{"key":"394_CR39","unstructured":"ISO\/IEC DIS 42001. Information technology\u2014artificial intelligence\u2014management system (2022)"},{"key":"394_CR40","unstructured":"ISO\/IEC TR 24029-1. Artificial Intelligence (AI)\u2014assessment of the robustness of neural networks\u2014part 1: Overview (2021)"},{"key":"394_CR41","unstructured":"ISO\/IEC TR 29119-11. Software and systems engineering\u2014software testing - Part 11: Guidelines on the testing of AI-based systems (2020)"},{"key":"394_CR42","doi-asserted-by":"crossref","unstructured":"Iyer, R., Li, Y., Li, H., Lewis, M., Sundar, R., Sycara, K.: Transparency and Explanation in Deep Reinforcement Learning Neural Networks. In Proceedings of the 2018 AAAI\/ACM Conference on AI, Ethics, and Society, 144-150. Association for Computing Machinery (2018)","DOI":"10.1145\/3278721.3278776"},{"key":"394_CR43","doi-asserted-by":"crossref","unstructured":"Kapusta, K., Mattioli, L., Addad, B., Lansari, M.: Protecting ownership rights of ML models using watermarking in the light of adversarial attacks. AI Trustworthiness Assessment, In AAAI Spring Symposium\u2013AITA (2023)","DOI":"10.1007\/s43681-023-00412-3"},{"key":"394_CR44","unstructured":"Kenya Matsushita, C.M.A. C.: Data bias and diversity and inclusion. Strategic Finance 102(6), 16\u201317 (2020)"},{"issue":"1","key":"394_CR45","doi-asserted-by":"publisher","first-page":"15","DOI":"10.4271\/2016-01-0128","volume":"4","author":"P Koopman","year":"2016","unstructured":"Koopman, P., Wagner, M.: Challenges in autonomous vehicle testing and validation. SAE Int J Trans Saf 4(1), 15\u201324 (2016)","journal-title":"SAE Int J Trans Saf"},{"key":"394_CR46","doi-asserted-by":"crossref","unstructured":"Liu, H., Yin, Q., Wang, W.Y.: Towards Explainable NLP: A Generative Explanation Framework for Text Classification. CoRR. arxiv:1811.00196 (2018)","DOI":"10.18653\/v1\/P19-1560"},{"key":"394_CR47","doi-asserted-by":"crossref","unstructured":"Loshin, D.: Chapter 5 - Data Quality and MDM. In Loshin, D., ed., Master Data Management, The MK\/OMG Press, 87\u2013103. Boston: Morgan Kaufmann. ISBN 978-0-12-374225-4 (2009)","DOI":"10.1016\/B978-0-12-374225-4.00005-9"},{"key":"394_CR48","volume-title":"White Paper Machine Learning in Certified Systems","author":"F Mamalet","year":"2021","unstructured":"Mamalet, F., Jenn, E., Flandrin, G., et al.: White Paper Machine Learning in Certified Systems. ANITI, Research report, IRT Saint Exup\u00e9ry (2021)"},{"key":"394_CR49","unstructured":"Mattioli, J., Delaborde, A., other.: Empowering the trustworthiness of ML-based critical systems through engineering activities. arXiv preprint arXiv:2209.15438 (2022)"},{"key":"394_CR50","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1016\/j.procs.2022.03.059","volume":"201","author":"J Mattioli","year":"2022","unstructured":"Mattioli, J., Robic, P.-O., Jesson, E.: Information Quality: the cornerstone for AI-based Industry 4.0. Procedia Comput Sci 201, 453\u2013460 (2022)","journal-title":"Procedia Comput Sci"},{"key":"394_CR51","unstructured":"Mattioli, J., Sohier, H., Delaborde, A., et\u00a0al.: Towards a holistic approach for AI trustworthiness assessment based upon aids for multi-criteria aggregation. In Safe AI (2023)"},{"key":"394_CR52","unstructured":"Mock, M., Schmitz, A., Adilova, L., et\u00a0al.: Management System Support for Trustworthy Artificial Intelligence. Fraunhofer IAIS (2021)"},{"key":"394_CR53","doi-asserted-by":"crossref","unstructured":"Nakajima, S.: Quality assurance of machine learning software. In 2018 IEEE 7th Global Conference on Consumer Electronics (GCCE), 601\u2013604. IEEE (2018)","DOI":"10.1109\/GCCE.2018.8574766"},{"key":"394_CR54","unstructured":"NSTC: The national artificial intelligence research and development strategic plan: 2019 update. National Science and Technology Council (US) (2019)"},{"key":"394_CR55","doi-asserted-by":"crossref","unstructured":"Oman, P., Hagemeister, J.: Metrics for assessing a software system\u2019s maintainability. In Proceedings Conference on Software Maintenance 1992, 337\u2013338. IEEE Computer Society (1992)","DOI":"10.1109\/ICSM.1992.242525"},{"key":"394_CR56","unstructured":"O\u2019Neill, O.: Trust, Trustworthiness, and Accountability. In Morris, N.; and Vines, D., eds., Capital Failure: Rebuilding Trust in Financial Services, 0. Oxford University Press. ISBN 978-0-19-871222-0 (2014)"},{"issue":"4","key":"394_CR57","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/MS.2020.2993662","volume":"37","author":"I Ozkaya","year":"2020","unstructured":"Ozkaya, I.: What is really different in engineering ai-enabled systems? IEEE Softw. 37(4), 3\u20136 (2020)","journal-title":"IEEE Softw."},{"issue":"4","key":"394_CR58","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3005714","volume":"49","author":"M Pendleton","year":"2016","unstructured":"Pendleton, M., Garcia-Lebron, R., Cho, J.-H., Xu, S.: A survey on systems security metrics. ACM Comput Surv (CSUR) 49(4), 1\u201335 (2016)","journal-title":"ACM Comput Surv (CSUR)"},{"key":"394_CR59","volume-title":"Four principles of explainable artificial intelligence","author":"PJ Phillips","year":"2020","unstructured":"Phillips, P.J., Hahn, C.A., Fontana, P.C., Broniatowski, D.A., Przybocki, M.A.: Four principles of explainable artificial intelligence. Gaithersburg, Maryland (2020)"},{"key":"394_CR60","unstructured":"Pushpalatha, R., MeenakshiSundaram, K.: Dice Similarity Based Ensemble Clustering for Sparsely Distributed High Dimensional Data. Int J Appl Eng Res. 12(23) (2017)"},{"key":"394_CR61","unstructured":"Redman, T.: Data Quality for the Information Age. Artech House Telecommunications Library, Artech House 9780890068830 (1996)"},{"key":"394_CR62","doi-asserted-by":"crossref","unstructured":"Ribeiro, M.T., Singh, S., Guestrin, C.: \u201cWhy Should I Trust You?\u201d: Explaining the Predictions of Any Classifier. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 1135-1144. New York, NY, USA: Association for Computing Machinery (2016)","DOI":"10.1145\/2939672.2939778"},{"key":"394_CR63","doi-asserted-by":"crossref","unstructured":"Ribeiro, M.T., Singh, S., Guestrin, C.: Anchors: High-precision model-agnostic explanations. In Proceedings of the AAAI conference on artificial intelligence 32, 1527\u20131535 (2018)","DOI":"10.1609\/aaai.v32i1.11491"},{"key":"394_CR64","doi-asserted-by":"crossref","unstructured":"Sanders, P.: Algorithm engineering\u2013an attempt at a definition. In Efficient algorithms, 321\u2013340. Springer (2009)","DOI":"10.1007\/978-3-642-03456-5_22"},{"key":"394_CR65","volume-title":"National security commission on artificial intelligence (AI)","author":"E Schmidt","year":"2021","unstructured":"Schmidt, E., Work, B., Catz, S., et al.: National security commission on artificial intelligence (AI). Technical report, National Security Commission on Artificial Intelligence (2021)"},{"key":"394_CR66","doi-asserted-by":"crossref","unstructured":"Schwalbe, G., Schels, M.: A survey on methods for the safety assurance of machine learning based systems. In 10th European Congress on Embedded Real Time Software and Systems (ERTS 2020) (2020)","DOI":"10.20378\/irb-47275"},{"key":"394_CR67","doi-asserted-by":"crossref","unstructured":"Serban, A., van\u00a0der Blom, K., Hoos, H., Visser, J.: Practices for engineering trustworthy machine learning applications. In 2021 IEEE\/ACM 1st Workshop on AI Engineering-Software Engineering for AI (WAIN), 97\u2013100 (2021)","DOI":"10.1109\/WAIN52551.2021.00021"},{"key":"394_CR68","doi-asserted-by":"crossref","unstructured":"Stanton, B., Jensen, T., et\u00a0al.: Trust and artificial intelligence. preprint (2021)","DOI":"10.6028\/NIST.IR.8332-draft"},{"key":"394_CR69","unstructured":"Treveil, M., Omont, N., Stenac, C., Lefevre, K., et\u00a0al.: Introducing MLOps. O\u2019Reilly Media (2020)"},{"issue":"3","key":"394_CR70","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/s43681-021-00043-6","volume":"1","author":"A van Wynsberghe","year":"2021","unstructured":"van Wynsberghe, A.: Sustainable AI: AI for sustainability and the sustainability of AI. AI and Ethics 1(3), 213\u2013218 (2021)","journal-title":"AI and Ethics"},{"issue":"4","key":"394_CR71","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1080\/07421222.1996.11518099","volume":"12","author":"RY Wang","year":"1996","unstructured":"Wang, R.Y., Strong, D.M.: Beyond accuracy: what data quality means to data consumers. J. Manag. Inf. Syst. 12(4), 5\u201333 (1996)","journal-title":"J. Manag. Inf. Syst."},{"issue":"10","key":"394_CR72","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1145\/3448248","volume":"64","author":"JM Wing","year":"2021","unstructured":"Wing, J.M.: Trustworthy ai. Commun. ACM 64(10), 64\u201371 (2021)","journal-title":"Commun. ACM"},{"key":"394_CR73","unstructured":"Xie, N., Ras, G., van Gerven, M., Doran, D.: Explainable deep learning: a field guide for the uninitiated. (2020) CoRR. arxiv:2004.14545"},{"key":"394_CR74","unstructured":"Zhang, J.M., Harman, M., Ma, L., Liu, Y.: Machine learning testing: Survey, landscapes and horizons. IEEE Transactions on Software Engineering (2020)"},{"issue":"1","key":"394_CR75","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TSE.2019.2962027","volume":"48","author":"JM Zhang","year":"2022","unstructured":"Zhang, J.M., Harman, M., Ma, L., Liu, Y.: Machine learning testing: survey, landscapes and horizons. IEEE Trans. Software Eng. 48(1), 1\u201336 (2022)","journal-title":"IEEE Trans. Software Eng."},{"key":"394_CR76","doi-asserted-by":"crossref","unstructured":"Zhang, Q., Cao, R., Shi, F., Wu, Y.N., Zhu, S.-C.: Interpreting cnn knowledge via an explanatory graph. In Proceedings of the AAAI Conference on Artificial Intelligence 32, 4454\u20134463 (2018)","DOI":"10.1609\/aaai.v32i1.11819"},{"key":"394_CR77","unstructured":"Zinkevich, M.: Rules of machine learning: best practices for ML engineering. https:\/\/developers.google.com\/machine-learning\/guides\/rules-of-ml (2017). Accessed Feb 2023"}],"container-title":["AI and Ethics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43681-023-00394-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43681-023-00394-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43681-023-00394-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T17:32:43Z","timestamp":1731000763000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43681-023-00394-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,8]]},"references-count":77,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["394"],"URL":"https:\/\/doi.org\/10.1007\/s43681-023-00394-2","relation":{},"ISSN":["2730-5953","2730-5961"],"issn-type":[{"value":"2730-5953","type":"print"},{"value":"2730-5961","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,8]]},"assertion":[{"value":"8 January 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}