{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,16]],"date-time":"2026-05-16T12:12:20Z","timestamp":1778933540110,"version":"3.51.4"},"reference-count":63,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T00:00:00Z","timestamp":1773619200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001771","name":"University of Newcastle Australia","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001771","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Intelligent Systems with Applications"],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1016\/j.iswa.2026.200653","type":"journal-article","created":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T16:43:35Z","timestamp":1773765815000},"page":"200653","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["TRIAG: Tri-reinforced infused generative agents for financial risk compliance"],"prefix":"10.1016","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-8327-7418","authenticated-orcid":false,"given":"Rafsun","family":"Sheikh","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3783-8769","authenticated-orcid":false,"given":"Shah J","family":"Miah","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"issue":"2\u20133","key":"10.1016\/j.iswa.2026.200653_bib0001","doi-asserted-by":"crossref","first-page":"517","DOI":"10.1007\/s10479-024-05875-z","article-title":"Tackling the global challenges using data-driven innovations","volume":"333","author":"Akter","year":"2024","journal-title":"Annals of Operations Research"},{"issue":"9","key":"10.1016\/j.iswa.2026.200653_bib0002","doi-asserted-by":"crossref","DOI":"10.14569\/IJACSA.2025.0160956","article-title":"Strategic decision support in financial management using deep learning-based stock price prediction models","volume":"16","author":"Almahadeen","year":"2025","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"10.1016\/j.iswa.2026.200653_bib0003","series-title":"Proceedings of the 2020 IEEE Asia-Pacific conference on computer science and data engineering (CSDE)","first-page":"1","article-title":"Impact of business technologies on the success of e-commerce strategies: Smes perspective","author":"Almtiri","year":"2020"},{"issue":"3","key":"10.1016\/j.iswa.2026.200653_bib0004","doi-asserted-by":"crossref","first-page":"18","DOI":"10.22495\/cbsrv4i3art2","article-title":"The effect of credit risk on the financial performance of commercial banks in Balkan countries","volume":"4","author":"Arifaj","year":"2023","journal-title":"Corporate and Business Strategy Review"},{"issue":"4","key":"10.1016\/j.iswa.2026.200653_bib0005","article-title":"Multilabel vulnerability classification in decentralized blockchain\u2013based reputation system","volume":"37","author":"Barmavat","year":"2025","journal-title":"Journal of Software: Evolution and Process"},{"key":"10.1016\/j.iswa.2026.200653_bib0006","doi-asserted-by":"crossref","DOI":"10.3389\/frai.2020.00026","article-title":"Explainable AI in fintech risk management","volume":"3","author":"Bussmann","year":"2020","journal-title":"Frontiers in Artificial Intelligence"},{"issue":"1","key":"10.1016\/j.iswa.2026.200653_bib0007","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5121\/ijsc.2023.14101","article-title":"Exploring sentiment analysis research: A social media data perspective","volume":"14","author":"Dahish","year":"2023","journal-title":"International Journal on Soft Computing"},{"issue":"11","key":"10.1016\/j.iswa.2026.200653_bib0008","doi-asserted-by":"crossref","first-page":"5924","DOI":"10.3390\/app15115924","article-title":"Smart contract security in decentralized finance: Enhancing vulnerability detection with reinforcement learning","volume":"15","author":"De Leon","year":"2025","journal-title":"Applied Sciences"},{"issue":"1","key":"10.1016\/j.iswa.2026.200653_bib0009","doi-asserted-by":"crossref","first-page":"244","DOI":"10.3390\/su16010244","article-title":"Integrated agent-based simulation and game theory decision support framework for cash flow and payment management in construction projects","volume":"16","author":"Dorrah","year":"2023","journal-title":"Sustainability"},{"issue":"4","key":"10.1016\/j.iswa.2026.200653_bib0010","doi-asserted-by":"crossref","first-page":"1450","DOI":"10.1108\/JFRA-05-2024-0286","article-title":"RegTech advancements-a comprehensive review of its evolution, challenges, and implications for financial regulation and compliance","volume":"23","author":"El Khoury","year":"2025","journal-title":"Journal of Financial Reporting and Accounting"},{"issue":"4\/5","key":"10.1016\/j.iswa.2026.200653_bib0011","doi-asserted-by":"crossref","first-page":"1129","DOI":"10.1108\/JEIM-03-2021-0155","article-title":"Analyzing the internet financial market risk management using data mining and deep learning methods","volume":"35","author":"Feng","year":"2021","journal-title":"Journal of Enterprise Information Management"},{"key":"10.1016\/j.iswa.2026.200653_bib0012","doi-asserted-by":"crossref","DOI":"10.3389\/frobt.2024.1229026","article-title":"Decentralized multi-agent reinforcement learning based on best-response policies","volume":"11","author":"Gabler","year":"2024","journal-title":"Frontiers in Robotics and AI"},{"issue":"1","key":"10.1016\/j.iswa.2026.200653_bib0013","doi-asserted-by":"crossref","DOI":"10.1080\/23322039.2019.1589406","article-title":"Credit risk and operational risk on financial performance of universal banks in Ghana: A partial least squared structural equation model (PLS SEM) approach","volume":"7","author":"Gadzo","year":"2019","journal-title":"Cogent Economics & Finance"},{"issue":"1","key":"10.1016\/j.iswa.2026.200653_bib0014","doi-asserted-by":"crossref","first-page":"1160","DOI":"10.1109\/TNNLS.2023.3327962","article-title":"Domain adaptation via prompt learning","volume":"36","author":"Ge","year":"2025","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"issue":"2","key":"10.1016\/j.iswa.2026.200653_bib0015","doi-asserted-by":"crossref","first-page":"337","DOI":"10.25300\/MISQ\/2013\/37.2.01","article-title":"Positioning and presenting design science research for maximum impact","volume":"37","author":"Gregor","year":"2013","journal-title":"MIS Quarterly"},{"key":"10.1016\/j.iswa.2026.200653_bib0016","doi-asserted-by":"crossref","DOI":"10.1007\/s10614-025-10969-2","article-title":"When positive sentiment is not so positive: Textual analytics and bank failures","author":"Gupta","year":"2025","journal-title":"Computational Economics"},{"key":"10.1016\/j.iswa.2026.200653_bib0017","series-title":"Proceedings of the 58th annual meeting of the association for computational linguistics","first-page":"8342","article-title":"Don\u2019t stop pretraining: Adapt language models to domains and tasks","author":"Gururangan","year":"2020"},{"issue":"4","key":"10.1016\/j.iswa.2026.200653_bib0018","doi-asserted-by":"crossref","DOI":"10.1016\/j.ipm.2025.104107","article-title":"Effectively detecting and diagnosing distributed multivariate time series anomalies via unsupervised federated hypernetwork","volume":"62","author":"Hao","year":"2025","journal-title":"Information Processing & Management"},{"issue":"1","key":"10.1016\/j.iswa.2026.200653_bib0019","doi-asserted-by":"crossref","first-page":"75","DOI":"10.2307\/25148625","article-title":"Design science in information systems research","volume":"28","author":"Hevner","year":"2004","journal-title":"MIS Quarterly"},{"key":"10.1016\/j.iswa.2026.200653_bib0020","doi-asserted-by":"crossref","unstructured":"Hu, W., & Chen, Y. (2022). Application of artificial intelligence in financial risk management. In Lecture notes in computer science (pp. 180\u2013188). 10.1007\/978-3-031-06794-5_15.","DOI":"10.1007\/978-3-031-06794-5_15"},{"issue":"5","key":"10.1016\/j.iswa.2026.200653_bib0021","doi-asserted-by":"crossref","first-page":"2733","DOI":"10.3390\/app15052733","article-title":"Advanced default risk prediction in small and medum-sized enterprises using large language models","volume":"15","author":"Huang","year":"2025","journal-title":"Applied Sciences"},{"issue":"2","key":"10.1016\/j.iswa.2026.200653_bib0022","doi-asserted-by":"crossref","first-page":"65","DOI":"10.3390\/ijfs13020065","article-title":"Exploring complexity: A bibliometric analysis of agent-based modeling in finance and banking","volume":"13","author":"Ionescu","year":"2025","journal-title":"International Journal of Financial Studies"},{"issue":"1","key":"10.1016\/j.iswa.2026.200653_bib0023","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1007\/s12525-024-00746-8","article-title":"Syndec: A synthetic data ecosystem","volume":"35","author":"Karst","year":"2025","journal-title":"Electronic Markets"},{"issue":"2","key":"10.1016\/j.iswa.2026.200653_bib0024","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1111\/coep.12243","article-title":"Bank competition and financial stability: Liquidity risk perspective","volume":"36","author":"Kim","year":"2017","journal-title":"Contemporary Economic Policy"},{"issue":"4","key":"10.1016\/j.iswa.2026.200653_bib0025","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1108\/18347641211272713","article-title":"Regulatory risk, borderline legality, fraud and financial restatement","volume":"20","author":"Khanin","year":"2012","journal-title":"International Journal of Accounting and Information Management"},{"key":"10.1016\/j.iswa.2026.200653_bib0026","doi-asserted-by":"crossref","first-page":"60","DOI":"10.17705\/1pais.12103","article-title":"On-cloud motherhood clinic: A healthcare management solution for rural communities in developing countries","author":"Khanom","year":"2020","journal-title":"Pacific Asia Journal of the Association for Information Systems"},{"key":"10.1016\/j.iswa.2026.200653_bib0027","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2022.118330","article-title":"Market manipulation detection: A systematic literature review","volume":"210","author":"Khodabandehlou","year":"2022","journal-title":"Expert Systems with Applications"},{"issue":"4","key":"10.1016\/j.iswa.2026.200653_bib0028","doi-asserted-by":"crossref","first-page":"1183","DOI":"10.24136\/oc.3109","article-title":"Enterprise generative artificial intelligence technologies, Internet of Things and blockchain-based fintech management, and digital twin industrial metaverse in the cognitive algorithmic economy","volume":"15","author":"Kliestik","year":"2024","journal-title":"Oeconomia Copernicana"},{"key":"10.1016\/j.iswa.2026.200653_bib0029","doi-asserted-by":"crossref","DOI":"10.3348\/kjr.2024.1161","article-title":"Adherence of studies on large language models for medical applications published in leading medical journals according to the MI-CLEAR-LLM checklist","volume":"26","author":"Ko","year":"2025","journal-title":"Korean Journal of Radiology"},{"issue":"11","key":"10.1016\/j.iswa.2026.200653_bib0030","doi-asserted-by":"crossref","first-page":"7006","DOI":"10.1109\/TCOMM.2024.3409530","article-title":"A collaborative multi-agent deep reinforcement learning-based wireless power allocation with centralized training and decentralized execution","volume":"72","author":"Kopic","year":"2024","journal-title":"IEEE Transactions on Communications"},{"issue":"2","key":"10.1016\/j.iswa.2026.200653_bib0031","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1111\/jori.70004","article-title":"Textual analysis of insurance claims with large language models","volume":"92","author":"Li","year":"2025","journal-title":"Journal of Risk and Insurance"},{"issue":"1","key":"10.1016\/j.iswa.2026.200653_bib0032","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/IJDWM.356510","article-title":"Research on fraud detection method of financial data of listed companies based on hmcran","volume":"20","author":"Li","year":"2024","journal-title":"International Journal of Data Warehousing and Mining"},{"issue":"1","key":"10.1016\/j.iswa.2026.200653_bib0033","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/IJDWM.356510","article-title":"Research on fraud detection method of financial data of listed companies based on hmcran","volume":"20","author":"Li","year":"2024","journal-title":"International Journal of Data Warehousing and Mining"},{"issue":"7","key":"10.1016\/j.iswa.2026.200653_bib0034","doi-asserted-by":"crossref","first-page":"545","DOI":"10.3390\/systems13070545","article-title":"Domain knowledge-enhanced process mining for anomaly detection in commercial bank business processes","volume":"13","author":"Li","year":"2025","journal-title":"Systems"},{"key":"10.1016\/j.iswa.2026.200653_bib0035","doi-asserted-by":"crossref","DOI":"10.3389\/fnbot.2024.1364587","article-title":"Hybrid knowledge transfer for MARL based on action advising and experience sharing","volume":"18","author":"Liu","year":"2024","journal-title":"Frontiers in Neurorobotics"},{"key":"10.1016\/j.iswa.2026.200653_bib0036","doi-asserted-by":"crossref","first-page":"113","DOI":"10.17705\/1pais.13306","article-title":"Internet of things adoption for saudi healthcare services","volume":"13","author":"Masmali","year":"2021","journal-title":"Pacific Asia Journal of the Association for Information Systems"},{"key":"10.1016\/j.iswa.2026.200653_bib0037","series-title":"Proceedings of the 2020 IEEE Asia-pacific conference on computer science and data engineering (CSDE)","first-page":"1","article-title":"Internet of Things-based innovations in Saudi healthcare sector: A methodological approach for investigating adoption issues","author":"Masmali","year":"2020"},{"issue":"4","key":"10.1016\/j.iswa.2026.200653_bib0038","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1016\/0167-9236(94)00041-2","article-title":"Design and natural science research on information technology","volume":"15","author":"March","year":"1995","journal-title":"Decision Support Systems"},{"issue":"2","key":"10.1016\/j.iswa.2026.200653_bib0039","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1177\/02666669211049492","article-title":"Designing an innovative unified contextual architecture for improving information retrieval service in healthcare organizations","volume":"39","author":"Miranda","year":"2023","journal-title":"Information Development"},{"key":"10.1016\/j.iswa.2026.200653_bib0040","doi-asserted-by":"crossref","DOI":"10.1016\/j.ribaf.2023.102009","article-title":"Safeguarding FinTech innovations with machine learning: Comparative assessment of various approaches","volume":"66","author":"Mirza","year":"2023","journal-title":"Research in International Business and Finance"},{"issue":"1","key":"10.1016\/j.iswa.2026.200653_bib0041","first-page":"113","article-title":"Trustworthy-constraint deep graph learning for enterprise financial risk prediction","volume":"29","author":"Ma","year":"2025","journal-title":"Journal of Applied Science and Engineering"},{"key":"10.1016\/j.iswa.2026.200653_bib0042","doi-asserted-by":"crossref","DOI":"10.3127\/ajis.v20i0.1329","article-title":"A design science research methodology for expert systems development","volume":"20","author":"Miah","year":"2016","journal-title":"Australasian Journal of Information Systems"},{"issue":"4","key":"10.1016\/j.iswa.2026.200653_bib0044","doi-asserted-by":"crossref","first-page":"313","DOI":"10.4258\/hir.2019.25.4.313","article-title":"Follow-up decision support tool for public healthcare: A design research perspective","volume":"25","author":"Miah","year":"2019","journal-title":"Healthcare Informatics Research"},{"issue":"1","key":"10.1016\/j.iswa.2026.200653_bib0045","doi-asserted-by":"crossref","first-page":"763","DOI":"10.1007\/s10639-020-10285-2","article-title":"Design requirements of a modern business master\u2019s degree course: Perspectives of industry practitioners","volume":"26","author":"Miah","year":"2021","journal-title":"Education and Information Technologies"},{"issue":"7","key":"10.1016\/j.iswa.2026.200653_bib0046","doi-asserted-by":"crossref","first-page":"1589","DOI":"10.1080\/02522667.2021.1930644","article-title":"Blockchain: At a glance idea for information science researchers","volume":"42","author":"Miah","year":"2021","journal-title":"Journal of Information and Optimization Sciences"},{"issue":"3","key":"10.1016\/j.iswa.2026.200653_bib0047","doi-asserted-by":"crossref","first-page":"45","DOI":"10.2753\/MIS0742-1222240302","article-title":"A design science research methodology for information systems research","volume":"24","author":"Peffers","year":"2007","journal-title":"Journal of Management Information Systems"},{"issue":"1","key":"10.1016\/j.iswa.2026.200653_bib0048","doi-asserted-by":"crossref","first-page":"44","DOI":"10.3390\/fi17010044","article-title":"Fraud detection in cryptocurrency networks\u2014An exploration using anomaly detection and heterogeneous graph transformers","volume":"17","author":"P\u00e9rez-Cano","year":"2025","journal-title":"Future Internet"},{"key":"10.1016\/j.iswa.2026.200653_bib0049","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TPAMI.2022.3191696","article-title":"A review of generalized zero-shot learning methods","author":"Pourpanah","year":"2022","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"10.1016\/j.iswa.2026.200653_bib0050","doi-asserted-by":"crossref","first-page":"e1998","DOI":"10.7717\/peerj-cs.1998","article-title":"A novel approach for credit card fraud transaction detection using deep reinforcement learning scheme","volume":"10","author":"Qayoom","year":"2024","journal-title":"PeerJ Computer Science"},{"issue":"5","key":"10.1016\/j.iswa.2026.200653_bib0051","doi-asserted-by":"crossref","first-page":"98","DOI":"10.3390\/risks13050098","article-title":"Historical perspectives in volatility forecasting methods with machine learning","volume":"13","author":"Qiu","year":"2025","journal-title":"Risks"},{"issue":"1","key":"10.1016\/j.iswa.2026.200653_bib0052","doi-asserted-by":"crossref","DOI":"10.1038\/s41598-025-98483-1","article-title":"Industrial applications of large language models","volume":"15","author":"Raza","year":"2025","journal-title":"Scientific Reports"},{"key":"10.1016\/j.iswa.2026.200653_bib0053","doi-asserted-by":"crossref","DOI":"10.1016\/j.neunet.2024.106537","article-title":"Curriculum learning empowered reinforcement learning for graph-based portfolio management: Performance optimization and comprehensive analysis","volume":"179","author":"Salamai","year":"2024","journal-title":"Neural Networks"},{"key":"10.1016\/j.iswa.2026.200653_bib0054","unstructured":"Schulman, J., Wolski, F., Dhariwal, P., Radford, A., & Klimov, O. (2017). Proximal policy optimization algorithms. arXiv. 10.48550\/ARXIV.1707.06347."},{"key":"10.1016\/j.iswa.2026.200653_bib0055","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2025.127581","article-title":"TransCORALNet: A two-stream transformer CORAL networks for supply chain credit assessment cold start","volume":"282","author":"Shi","year":"2025","journal-title":"Expert Systems with Applications"},{"key":"10.1016\/j.iswa.2026.200653_bib0056","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2024.124951","article-title":"Flexible recommendation for optimizing the debt collection process based on customer risk using deep reinforcement learning","volume":"256","author":"Sivamayilvelan","year":"2024","journal-title":"Expert Systems with Applications"},{"key":"10.1016\/j.iswa.2026.200653_bib0057","doi-asserted-by":"crossref","DOI":"10.1007\/s10796-025-10581-7","article-title":"Generative artificial intelligence: Evolving technology, growing societal impact, and opportunities for information systems research","author":"Storey","year":"2025","journal-title":"Information Systems Frontiers"},{"issue":"1","key":"10.1016\/j.iswa.2026.200653_bib0058","first-page":"1","article-title":"Catalyzing financial risk control excellence: A novel fusion model - pso-boost-trans","volume":"36","author":"Song","year":"2024","journal-title":"Journal of Organizational and End User Computing"},{"key":"10.1016\/j.iswa.2026.200653_bib0059","series-title":"Proceedings of the tenth international conference on international conference on machine learning","first-page":"330","article-title":"Multi-agent reinforcement learning: Independent versus cooperative agents","author":"Tan","year":"1993"},{"key":"10.1016\/j.iswa.2026.200653_bib0060","doi-asserted-by":"crossref","first-page":"182547","DOI":"10.1109\/ACCESS.2024.3491175","article-title":"A credit card fraud detection algorithm based on sdt and federated learning","volume":"12","author":"Tang","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.iswa.2026.200653_bib0061","doi-asserted-by":"crossref","DOI":"10.1016\/j.tre.2025.104020","article-title":"Developing the value of legal judgments of supply chain finance for credit risk prediction through novel ACWGAN-GPSA approach","volume":"196","author":"Wang","year":"2025","journal-title":"Transportation Research Part E: Logistics and Transportation Review"},{"issue":"2\u20133","key":"10.1016\/j.iswa.2026.200653_bib0062","first-page":"579","article-title":"Identifying fintech risk through machine learning: Analyzing the Q&A N text of an online loan investment platform","volume":"333","author":"Xia","year":"2020","journal-title":"Annals of Operations Research"},{"issue":"2","key":"10.1016\/j.iswa.2026.200653_bib0063","article-title":"The impact of market risk exposure on banks\u2019 financial performance: Evidence from the MENA region","volume":"22","author":"Yousef","year":"2023","journal-title":"Management and Accounting Review"},{"key":"10.1016\/j.iswa.2026.200653_bib0064","doi-asserted-by":"crossref","DOI":"10.1016\/j.pacfin.2025.102829","article-title":"Generative AI: The transformative impact of ChatGPT on systemic financial risk in Chinese banks","volume":"93","author":"Zhao","year":"2025","journal-title":"Pacific-Basin Finance Journal"}],"container-title":["Intelligent Systems with Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667305326000281?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667305326000281?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,5,16]],"date-time":"2026-05-16T11:32:33Z","timestamp":1778931153000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2667305326000281"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,5]]},"references-count":63,"alternative-id":["S2667305326000281"],"URL":"https:\/\/doi.org\/10.1016\/j.iswa.2026.200653","relation":{},"ISSN":["2667-3053"],"issn-type":[{"value":"2667-3053","type":"print"}],"subject":[],"published":{"date-parts":[[2026,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"TRIAG: Tri-reinforced infused generative agents for financial risk compliance","name":"articletitle","label":"Article Title"},{"value":"Intelligent Systems with Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.iswa.2026.200653","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Authors. Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"200653"}}