{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T03:10:15Z","timestamp":1767323415746,"version":"3.48.0"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032144324","type":"print"},{"value":"9783032144331","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-14433-1_6","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T03:07:27Z","timestamp":1767323247000},"page":"279-342","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Results and Analysis"],"prefix":"10.1007","author":[{"given":"Fadele Ayotunde","family":"Alaba","sequence":"first","affiliation":[]},{"given":"Il\u00e9sanm\u00ed Gabriel","family":"Ajibola","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0750-8187","authenticated-orcid":false,"given":"Alvaro","family":"Rocha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"6_CR1","doi-asserted-by":"publisher","unstructured":"H. Debash et al., Tuberculosis treatment outcomes and its predictors among tuberculosis patients registered at Tefera Hailu Memorial General Hospital, Sekota Town, Northeast Ethiopia: A seven-year retrospective study. Can. J. Infect. Dis. Med. Microbiol. 2023 (2023). https:\/\/doi.org\/10.1155\/2023\/4212312","DOI":"10.1155\/2023\/4212312"},{"key":"6_CR2","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1016\/j.sbspro.2015.01.112","volume":"171","author":"J Tavakolizadeh","year":"2015","unstructured":"J. Tavakolizadeh, M. Nejatian, A. Soori, The effectiveness of communication skills training on marital conflicts and its different aspects in women. Procedia\u2013Soc. Behav. Sci. 171, 214\u2013221 (2015). https:\/\/doi.org\/10.1016\/j.sbspro.2015.01.112","journal-title":"Procedia\u2013Soc. Behav. Sci."},{"issue":"2","key":"6_CR3","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1177\/14034948211031392","volume":"50","author":"JA Bennie","year":"2022","unstructured":"J.A. Bennie, G. Faulkner, J.J. Smith, The epidemiology of muscle-strengthening activity among adolescents from 28 European countries. Scand. J. Public Health 50(2), 295\u2013302 (2022). https:\/\/doi.org\/10.1177\/14034948211031392","journal-title":"Scand. J. Public Health"},{"key":"6_CR4","doi-asserted-by":"publisher","unstructured":"I. Jessika, F. Mbaye, A. Diallo, F. Ly, and P. M. Semb\u00e8ne, Evaluation of malnutrition in infants aged 0 - 59 months in the suburbs of Dakar. Health (Irvine. Calif). 15(04), 349\u2013366 (2023). https:\/\/doi.org\/10.4236\/health.2023.154024","DOI":"10.4236\/health.2023.154024"},{"issue":"2","key":"6_CR5","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1001\/jamaophthalmol.2021.5269","volume":"140","author":"E Korot","year":"2022","unstructured":"E. Korot et al., Enablers and barriers to deployment of smartphone-based home vision monitoring in clinical practice settings. JAMA Ophthalmol. 140(2), 153\u2013160 (2022). https:\/\/doi.org\/10.1001\/jamaophthalmol.2021.5269","journal-title":"JAMA Ophthalmol."},{"key":"6_CR6","unstructured":"K.C. Obi, O. Iwuanyanwu, Innovation in the assessment of primary school mathematics: an approach to revamping Nigeria education. J. Teach. Perspect. 18(1), 51\u201366 (2023), [Online]. Available: http:\/\/repositorio.unan.edu.ni\/2986\/1\/5624.pdf%0Ahttp:\/\/fiskal.kemenkeu.go.id\/ejournal%0A10.1016\/j.cirp.2016.06.001%0A10.1016\/j.powtec.2016.12.055%0A10.1016\/j.ijfatigue.2019.02.006%0A10.1"},{"issue":"9","key":"6_CR7","doi-asserted-by":"publisher","first-page":"2412","DOI":"10.1109\/TIFS.2019.2898817","volume":"14","author":"MJ Farooq","year":"2019","unstructured":"M.J. Farooq, Q. Zhu, Modeling, analysis, and mitigation of dynamic botnet formation in wireless IoT networks. IEEE Trans. Inf. Forensics Secur. 14(9), 2412\u20132426 (2019). https:\/\/doi.org\/10.1109\/TIFS.2019.2898817","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"6_CR8","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1016\/j.future.2019.12.018","volume":"105","author":"SNG Gourisetti","year":"2020","unstructured":"S.N.G. Gourisetti, M. Mylrea, H. Patangia, Cybersecurity vulnerability mitigation framework through empirical paradigm: Enhanced prioritized gap analysis. Futur. Gener. Comput. Syst. 105, 410\u2013431 (2020). https:\/\/doi.org\/10.1016\/j.future.2019.12.018","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"1","key":"6_CR9","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/s10664-019-09749-y","volume":"25","author":"VP Ranganath","year":"2020","unstructured":"V.P. Ranganath, J. Mitra, Are free Android app security analysis tools effective in detecting known vulnerabilities? Empir. Softw. Eng. 25(1), 178\u2013219 (2020). https:\/\/doi.org\/10.1007\/s10664-019-09749-y","journal-title":"Empir. Softw. Eng."},{"issue":"1","key":"6_CR10","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1177\/0846537120967345","volume":"72","author":"W Parker","year":"2021","unstructured":"W. Parker et al., Canadian association of radiologists white paper on de-identification of medical imaging: Part 2, practical considerations. Can. Assoc. Radiol. J. 72(1), 25\u201334 (2021). https:\/\/doi.org\/10.1177\/0846537120967345","journal-title":"Can. Assoc. Radiol. J."},{"key":"6_CR11","doi-asserted-by":"publisher","unstructured":"Y. Liu, Y. Li, S. W. Lin, and C. Artho, Finding permission bugs in smart contracts with role mining, ISSTA 2022\u2013Proc. 31st ACM SIGSOFT Int. Symp. Softw. Test. Anal. 1, 716\u2013727 (2022). https:\/\/doi.org\/10.1145\/3533767.3534372","DOI":"10.1145\/3533767.3534372"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"H.S. Munawar, F. Ullah, S. Qayyum, Big data in construction\u202f: Current applications and future opportunities (2022)","DOI":"10.3390\/bdcc6010018"},{"key":"6_CR13","unstructured":"P. Coberly-Holt, K. Elufiede, Preparing for the fourth industrial revolution with creative and critical thinking Patricia Coberly-Holt and Kemi Elufiede, pp. 21\u201325 (2016)"},{"issue":"3","key":"6_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2023.e13916","volume":"9","author":"P Chen","year":"2023","unstructured":"P. Chen, S.K. Kim, The impact of digital transformation on innovation performance\u2013The mediating role of innovation factors. Heliyon 9(3), e13916 (2023). https:\/\/doi.org\/10.1016\/j.heliyon.2023.e13916","journal-title":"Heliyon"},{"key":"6_CR15","doi-asserted-by":"publisher","unstructured":"F. Faghihi, M. Abadi, A. Tajoddin, SMSBotHunter: A novel anomaly detection technique to detect SMS botnets. In: 2018 15th International ISC (Iranian Society of Cryptology) Conference on Information Security Cryptology, ISC. 2018, pp. 1\u20136 (2018). https:\/\/doi.org\/10.1109\/ISCISC.2018.8546934","DOI":"10.1109\/ISCISC.2018.8546934"},{"issue":"2","key":"6_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jjimei.2021.100051","volume":"1","author":"T Chauhan","year":"2021","unstructured":"T. Chauhan, H. Palivela, Optimization and improvement of fake news detection using deep learning approaches for societal benefit. Int. J. Inf. Manag. Data Insights 1(2), 100051 (2021). https:\/\/doi.org\/10.1016\/j.jjimei.2021.100051","journal-title":"Int. J. Inf. Manag. Data Insights"},{"key":"6_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.techfore.2021.121293","volume":"174","author":"J Fernandez-Vidal","year":"2022","unstructured":"J. Fernandez-Vidal, R. Gonzalez, J. Gasco, J. Llopis, Digitalization and corporate transformation: The case of European oil and gas firms. Technol. Forecast. Soc. Change 174, 1\u201331 (2022). https:\/\/doi.org\/10.1016\/j.techfore.2021.121293","journal-title":"Technol. Forecast. Soc. Change"},{"issue":"1","key":"6_CR18","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1080\/00913367.2021.1880345","volume":"51","author":"C Lou","year":"2022","unstructured":"C. Lou, Social media influencers and followers: Theorization of a trans-parasocial relation and explication of its implications for influencer advertising. J. Advert. 51(1), 4\u201321 (2022). https:\/\/doi.org\/10.1080\/00913367.2021.1880345","journal-title":"J. Advert."},{"key":"6_CR19","doi-asserted-by":"publisher","DOI":"10.1080\/00913367.2021.1880345","author":"C Lou","year":"2021","unstructured":"C. Lou, Social media influencers and followers: Theorization of a trans-parasocial relation and explication of its implications for influencer advertising. J. Advert. (2021). https:\/\/doi.org\/10.1080\/00913367.2021.1880345","journal-title":"J. Advert."},{"issue":"8","key":"6_CR20","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1002\/ajim.23262","volume":"64","author":"A Jetha","year":"2021","unstructured":"A. Jetha et al., Fragmentation in the future of work: A horizon scan examining the impact of the changing nature of work on workers experiencing vulnerability. Am. J. Ind. Med. 64(8), 649\u2013666 (2021). https:\/\/doi.org\/10.1002\/ajim.23262","journal-title":"Am. J. Ind. Med."},{"key":"6_CR21","unstructured":"J.C.S.A, Delta ruled first order iterative deep neural learning for sybil and wormhole attacks detection in healthcare wireless sensor network (2021)"},{"key":"6_CR22","doi-asserted-by":"publisher","unstructured":"S. Ali, Q. Li, A. Yousafzai, Blockchain and federated learning-based intrusion detection approaches for edge-enabled industrial IoT networks: A survey. Ad Hoc Networks. 152 (2024). https:\/\/doi.org\/10.1016\/j.adhoc.2023.103320","DOI":"10.1016\/j.adhoc.2023.103320"},{"key":"6_CR23","doi-asserted-by":"publisher","first-page":"59353","DOI":"10.1109\/ACCESS.2021.3073408","volume":"9","author":"N Mishra","year":"2021","unstructured":"N. Mishra, S. Pandya, Internet of things applicaations, security challenges, attacks, intrusion detection, and future visions: A systematic review. IEEE Access 9, 59353\u201359377 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3073408","journal-title":"IEEE Access"},{"key":"6_CR24","doi-asserted-by":"publisher","unstructured":"G. Rajendran, R.S. Ragul Nivash, P.P. Parthy, S. Balamurugan, Modern security threats in the internet of things (IoT): Attacks and countermeasures. Proc. Int. Carnahan Conf. Secur. Technol. 2019 (2019). https:\/\/doi.org\/10.1109\/CCST.2019.8888399","DOI":"10.1109\/CCST.2019.8888399"},{"key":"6_CR25","doi-asserted-by":"publisher","unstructured":"K.P. Seng, L.M. Ang, E. Ngharamike, Artificial intelligence Internet of Things: A new paradigm of distributed sensor networks. Int. J. Distrib. Sens. Networks. 18(3) (2022). https:\/\/doi.org\/10.1177\/15501477211062835","DOI":"10.1177\/15501477211062835"},{"key":"6_CR26","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/j.parco.2016.10.004","volume":"61","author":"H Fu","year":"2017","unstructured":"H. Fu, H. Chen, Y. Zhu, W. Yu, FARMS: Efficient map reduce speculation for failure recovery in short jobs. Parallel Comput. 61, 68\u201382 (2017). https:\/\/doi.org\/10.1016\/j.parco.2016.10.004","journal-title":"Parallel Comput."},{"key":"6_CR27","doi-asserted-by":"publisher","unstructured":"J. Akoka, I. Comyn-Wattiau, A method for emerging technology evaluation. Application to blockchain and smart data discovery. Concept. Model. Perspect., pp. 247\u2013258 (2017). https:\/\/doi.org\/10.1007\/978-3-319-67271-7_17","DOI":"10.1007\/978-3-319-67271-7_17"},{"key":"6_CR28","unstructured":"O.T. Olajide, Employees\u2019 attitudes and efficiency of human resource management practices: Evidence from Nigeria. Eur. J. Bus. Manag. ISSN. 6(31), 68\u201373 (2014), [Online]. Available: www.iiste.org"},{"issue":"2","key":"6_CR29","doi-asserted-by":"publisher","first-page":"2833","DOI":"10.32604\/cmc.2023.036138","volume":"75","author":"NM Alshahrani","year":"2023","unstructured":"N.M. Alshahrani, M.L.M. Kiah, B.B. Zaidan, A.H. Alamoodi, A. Saif, A review of smart contract blockchain based on multi-criteria analysis: Challenges and motivations. Comput. Mater. Contin. 75(2), 2833\u20132858 (2023). https:\/\/doi.org\/10.32604\/cmc.2023.036138","journal-title":"Comput. Mater. Contin."},{"key":"6_CR30","doi-asserted-by":"publisher","unstructured":"K. Gilani, F. Ghaffari, E. Bertin, and N. Crespi, Self-sovereign identity management framework using smart contracts. In: Proceeding IEEE\/IFIP Network Operation and Management Symposium 2022 Network Service Management Era Cloudification, Softwarization Artificial Intelligent NOMS 2022 (2022). https:\/\/doi.org\/10.1109\/NOMS54207.2022.9789831","DOI":"10.1109\/NOMS54207.2022.9789831"},{"key":"6_CR31","doi-asserted-by":"publisher","unstructured":"A.O. Omotayo, A.B. Omotoso, S.A. Daud, O.P. Omotayo, B.A. Adeniyi, Rising food prices and farming households food insecurity during the COVID-19 pandemic: Policy implications from South West Nigeria. Agriculture. 12(3) (2022). https:\/\/doi.org\/10.3390\/agriculture12030363","DOI":"10.3390\/agriculture12030363"},{"issue":"9","key":"6_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s22093207","volume":"22","author":"N Sidek","year":"2022","unstructured":"N. Sidek, N. Ali, G. Alkawsi, An integrated success model of internet of things (IoT)-based services in facilities management for public sector. Sensors 22(9), 1\u201332 (2022). https:\/\/doi.org\/10.3390\/s22093207","journal-title":"Sensors"},{"key":"6_CR33","doi-asserted-by":"publisher","unstructured":"C. Arnold, K.I. Voigt, Determinants of industrial internet of things adoption in German manufacturing companies. Int. J. Innov. Technol. Manag. 16(6) 2019. https:\/\/doi.org\/10.1142\/S021987701950038X","DOI":"10.1142\/S021987701950038X"},{"key":"6_CR34","unstructured":"A. Ahmed, Assistant, Ontological, Epistemological and methodological assumptions\u202f: Qualitative Versus Quantitative Abdelhamid Ahmed assistant lecturer at the curriculum & instruction Deptartment, Faculty of Education, Helwan University, Egypt. Currently, a PhD student at Scholar (2018)"},{"key":"6_CR35","doi-asserted-by":"publisher","unstructured":"F. Naz, R. Agrawal, S. Luthra, A. Kumar, Reviewing the applications of artificial intelligence in sustainable supply chains\u202f: Exploring research propositions for future directions, pp. 2400\u20132423 (2022). https:\/\/doi.org\/10.1002\/bse.3034","DOI":"10.1002\/bse.3034"}],"container-title":["Studies in Computational Intelligence","Learning Beyond the Classroom"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-14433-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T03:07:29Z","timestamp":1767323249000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-14433-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032144324","9783032144331"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-14433-1_6","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"value":"1860-949X","type":"print"},{"value":"1860-9503","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}