{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T16:38:48Z","timestamp":1768408728465,"version":"3.49.0"},"reference-count":126,"publisher":"Informa UK Limited","issue":"1","license":[{"start":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T00:00:00Z","timestamp":1763683200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100002322","name":"Coordena\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior","doi-asserted-by":"crossref","award":["001"],"award-info":[{"award-number":["001"]}],"id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Enterprise Information Systems"],"published-print":{"date-parts":[[2026,1,2]]},"DOI":"10.1080\/17517575.2025.2588753","type":"journal-article","created":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T12:40:33Z","timestamp":1763728833000},"update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":1,"title":["Trust Management in the Age of Zero trust: a comprehensive multi-method analysis from enterprise challenges"],"prefix":"10.1080","volume":"20","author":[{"given":"Ang\u00e9lica","family":"Pigola","sequence":"first","affiliation":[{"name":"S\u00e3o Paulo Business School, Funda\u00e7\u00e3o Getulio Vargas (FGV EAESP), S\u00e3o Paulo","place":["Brazil"]}]},{"given":"Fernando","family":"de Souza Meirelles","sequence":"additional","affiliation":[{"name":"S\u00e3o Paulo Business School, Funda\u00e7\u00e3o Getulio Vargas (FGV EAESP), S\u00e3o Paulo","place":["Brazil"]}]},{"given":"Priscila Rezende","family":"da Costa","sequence":"additional","affiliation":[{"name":"Escola Superior de Propaganda e Marketing (ESPM), S\u00e3o Paulo","place":["Brazil"]}]}],"member":"301","published-online":{"date-parts":[[2025,11,21]]},"reference":[{"key":"e_1_3_4_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2865539"},{"key":"e_1_3_4_3_1","doi-asserted-by":"publisher","DOI":"10.1186\/s43067-024-00155-z"},{"key":"e_1_3_4_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.egyr.2021.11.272"},{"key":"e_1_3_4_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59635-4_22"},{"key":"e_1_3_4_6_1","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/3178760"},{"key":"e_1_3_4_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3040220"},{"key":"e_1_3_4_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3132580"},{"key":"e_1_3_4_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2023.2301178"},{"key":"e_1_3_4_10_1","doi-asserted-by":"publisher","DOI":"10.3390\/info14020129"},{"key":"e_1_3_4_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121676"},{"key":"e_1_3_4_12_1","doi-asserted-by":"publisher","DOI":"10.1108\/ECAM-12-2022-1131"},{"key":"e_1_3_4_13_1","unstructured":"Balaouras S. C. Cunningham and P. Cerrato. 2018. Five Steps to a Zero Trust Network: Zero Trust Is the Blueprint for Your Security Architecture. No. 1. Forrester Research. pdf (https:\/\/www.forrester.com\/report\/Five-Steps-To-A-Zero-Trust-Network\/RES120510). https:\/\/www.forrester.com\/report\/Five-Steps-To-A-Zero-Trust-Network\/RES120510."},{"key":"e_1_3_4_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3600160.3605074"},{"key":"e_1_3_4_15_1","doi-asserted-by":"publisher","DOI":"10.1177\/014920630102700601"},{"key":"e_1_3_4_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2969820"},{"key":"e_1_3_4_17_1","volume-title":"Predicts 2025: Scaling Zero-Trust Technology and Resilience","author":"Bhogal C.","year":"2025","unstructured":"Bhogal, C., W. Hankins, M. Acosta, and J. Watts. 2025. Predicts 2025: Scaling Zero-Trust Technology and Resilience. ID G00810447. Infrastructure Security. Gartner, 2025. pdf. https:\/\/www.gartner.com\/en\/documents\/6283983."},{"key":"e_1_3_4_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2020.103584"},{"key":"e_1_3_4_19_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781506335193.n4"},{"key":"e_1_3_4_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"e_1_3_4_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2021.101852"},{"key":"e_1_3_4_22_1","doi-asserted-by":"publisher","DOI":"10.2307\/3250956"},{"key":"e_1_3_4_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102436"},{"key":"e_1_3_4_24_1","doi-asserted-by":"publisher","DOI":"10.5220\/0006019801000104"},{"key":"e_1_3_4_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3041042"},{"key":"e_1_3_4_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2021.04.487"},{"key":"e_1_3_4_27_1","unstructured":"CISA. 2023. \u201cZero Trust Maturity Model.\u201d Cybersecurity and Infrastructure Security Agency. https:\/\/www.cisa.gov\/zero-trust-maturity-model.pdf. https:\/\/www.cisa.gov\/zero-trust-maturity-model."},{"key":"e_1_3_4_28_1","unstructured":"CMMI Institute. 2019. \u201cIntroducing CMMI Security V2.0. [Online].\u201d https:\/\/cmmiinstitute.com\/cmmi\/sec."},{"key":"e_1_3_4_29_1","volume-title":"Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory","author":"Corbin J. M.","year":"2015","unstructured":"Corbin, J. M., and A. L. Strauss. 2015. Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory. 4th ed. Los Angeles: SAGE.","edition":"4"},{"key":"e_1_3_4_30_1","doi-asserted-by":"publisher","DOI":"10.1177\/11786329231213706"},{"key":"e_1_3_4_31_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12460"},{"key":"e_1_3_4_32_1","volume-title":"Research Design: Qualitative, Quantitative, and Mixed Methods Approaches","author":"Creswell J. W.","year":"2014","unstructured":"Creswell, J. W. 2014. Research Design: Qualitative, Quantitative, and Mixed Methods Approaches. 4th ed. Thousand Oaks: SAGE Publications.","edition":"4"},{"key":"e_1_3_4_33_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1997.9707180258"},{"key":"e_1_3_4_34_1","doi-asserted-by":"publisher","DOI":"10.1177\/1558689812437186"},{"key":"e_1_3_4_35_1","unstructured":"D\u2019Hoinne J. and P. Shoard. 2024. Use the U.S. DoD Model for Your Zero Trust Approach: Visibility & Analytics Pillar. Zero Trust Paradigm ID G00806444. Gartner. Gartner 2024. pdf. https:\/\/www.gartner.com\/document\/5124931?ref=solrAll&refval=395625636&."},{"key":"e_1_3_4_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2930000"},{"key":"e_1_3_4_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3290911"},{"key":"e_1_3_4_38_1","doi-asserted-by":"publisher","DOI":"10.1080\/0960085X.2021.1978344"},{"key":"e_1_3_4_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/I2CT51068.2021.9418203"},{"key":"e_1_3_4_40_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.2007.26586086"},{"key":"e_1_3_4_41_1","doi-asserted-by":"publisher","DOI":"10.2307\/258191"},{"key":"e_1_3_4_42_1","doi-asserted-by":"publisher","DOI":"10.1080\/19420676.2023.2203141"},{"key":"e_1_3_4_43_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12030566"},{"key":"e_1_3_4_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9236(00)00139-1"},{"key":"e_1_3_4_45_1","volume-title":"Stakeholder Theory: The State of the Art","author":"Freeman R. E.","year":"2013","unstructured":"Freeman, R. E., ed. 2013. Stakeholder Theory: The State of the Art. 3 ed. print. Cambridge: Cambridge Univ. Press.","edition":"3"},{"key":"e_1_3_4_46_1","doi-asserted-by":"publisher","DOI":"10.1177\/1094428112452151"},{"key":"e_1_3_4_47_1","doi-asserted-by":"publisher","DOI":"10.4324\/9780203793206"},{"key":"e_1_3_4_48_1","unstructured":"Google. 2018. \u201cA New Approach to Enterprise Security.\u201d BeyondCorp. https:\/\/www.beyondcorp.com\/."},{"key":"e_1_3_4_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(21)00063-5"},{"key":"e_1_3_4_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2019.11.069"},{"key":"e_1_3_4_51_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12441"},{"key":"e_1_3_4_52_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2012.00420.x"},{"issue":"1","key":"e_1_3_4_53_1","first-page":"305","article-title":"The Blockchain as a Backbone of GDPR Compliant Frameworks","volume":"20","author":"Hristov P.","year":"2019","unstructured":"Hristov, P., and W. Dimitrov. 2019. \u201cThe Blockchain as a Backbone of GDPR Compliant Frameworks.\u201d Calitatea 20 (S1): 305. https:\/\/www.researchgate.net\/publication\/328576742.","journal-title":"Calitatea"},{"key":"e_1_3_4_54_1","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2025.2457952"},{"key":"e_1_3_4_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-48318-9"},{"key":"e_1_3_4_56_1","doi-asserted-by":"publisher","DOI":"10.1108\/SL-02-2019-0032"},{"key":"e_1_3_4_57_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12153283"},{"key":"e_1_3_4_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/0304-405X(76)90026-X"},{"key":"e_1_3_4_59_1","doi-asserted-by":"publisher","DOI":"10.2307\/2392366"},{"key":"e_1_3_4_60_1","doi-asserted-by":"publisher","DOI":"10.1108\/JAMR-04-2022-0087"},{"key":"e_1_3_4_61_1","doi-asserted-by":"publisher","DOI":"10.3390\/sym13040525"},{"key":"e_1_3_4_62_1","unstructured":"Keyfactor. 2022. \u201cWhy Zero Trust Manufacturing Is Critical to Building Trusted IoT Devices.\u201d Keyfactor. April 23 2022. https:\/\/www.keyfactor.com\/blog\/why-zero-trust-manufacturing-is-critical-to-building-trusted-iot-devices\/."},{"key":"e_1_3_4_63_1","doi-asserted-by":"publisher","DOI":"10.1177\/0266666916673216"},{"key":"e_1_3_4_64_1","unstructured":"Kindervag J. 2010. \u201cBuild Security into Your Network\u2019s DNA: The Zero Trust Network Architecture.\u201d Forrester Research 27. http:\/\/www.virtualstarmedia.com\/downloads\/Forrester_zero_trust_DNA.pdf."},{"key":"e_1_3_4_65_1","article-title":"No More Chewy Centers: The Zero Trust Model of Information Security","volume":"23","author":"Kindervag J.","year":"2016","unstructured":"Kindervag, J. 2016. \u201cNo More Chewy Centers: The Zero Trust Model of Information Security.\u201d Forrester Research 23. pdf. https:\/\/crystaltechnologies.com\/wp-content\/uploads\/2017\/12\/forrester-zero-trust-model-information-security.pdf.","journal-title":"Forrester Research"},{"key":"e_1_3_4_66_1","unstructured":"Koeppen D. and J. Watts. 2024. \u201cImplement Zero-Trust Network Access through a Life Cycle Approach.\u201d Gartner January 5 2024. https:\/\/www.gartner.com\/en\/documents\/5398563."},{"key":"e_1_3_4_67_1","volume-title":"Strategic Roadmap for Zero-Trust Security Program Implementation","author":"Koeppen D.","year":"2025","unstructured":"Koeppen, D., J. Watts, W. Hankins, M. Acosta, and T. Taylor. 2025. Strategic Roadmap for Zero-Trust Security Program Implementation. ID G00808925. Infrastructure Security; Build and Optimize Cybersecurity Programs. Gartner. pdf. https:\/\/www.gartner.com\/en\/documents\/6304515."},{"key":"e_1_3_4_68_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2022\/15554"},{"key":"e_1_3_4_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-022-10280-7"},{"key":"e_1_3_4_70_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781003225096"},{"key":"e_1_3_4_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3306452"},{"key":"e_1_3_4_72_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jairtraman.2007.04.008"},{"key":"e_1_3_4_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3475797"},{"key":"e_1_3_4_74_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.10.003"},{"key":"e_1_3_4_75_1","unstructured":"McIntyre G. 2024. \u201cHow Zero Trust Supports Cyber Resilience for Healthcare Organizations.\u201d CDW HealthTech June 3 2024. https:\/\/healthtechmagazine.net\/article\/2024\/06\/how-zero-trust-supports-cyber-resilience-healthcare-organizations."},{"key":"e_1_3_4_76_1","volume-title":"Studies in Language Testing 43","author":"Moeller A. K.","year":"2016","unstructured":"2016. \u201cSecond Language Assessment and Mixed Methods Research.\u201d In Studies in Language Testing 43, edited by Moeller, A. K., J. W. Creswell, and N. Saville, 125. Cambridge: Cambridge University Press."},{"issue":"4","key":"e_1_3_4_77_1","first-page":"1","article-title":"Qualitative Research Methods in Information Systems: A Call for Phenomenon-Focused Problematization","volume":"46","author":"Monteiro E.","year":"2022","unstructured":"Monteiro, E., P. Constantinides, S. Scott, M. Shaikh, and A. Burton-Jones. 2022. \u201cQualitative Research Methods in Information Systems: A Call for Phenomenon-Focused Problematization.\u201d MIS Quarterly: Management Information Systems, Editorial Comments 46 (4): 1\u201317.","journal-title":"MIS Quarterly: Management Information Systems, Editorial Comments"},{"key":"e_1_3_4_78_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-28073-3_49"},{"key":"e_1_3_4_79_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2021.102334"},{"key":"e_1_3_4_80_1","doi-asserted-by":"publisher","DOI":"10.1177\/02683962211019406"},{"key":"e_1_3_4_81_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijproman.2022.08.003"},{"key":"e_1_3_4_82_1","volume-title":"Qualitative Research & Evaluation Methods: Integrating Theory and Practice","author":"Patton M. Q.","year":"2023","unstructured":"Patton, M. Q. 2023. Qualitative Research & Evaluation Methods: Integrating Theory and Practice. 4th ed. Thousand Oaks, CA: SAGE Publications. pdf. https:\/\/books.google.com.br\/books?id=HXitEAAAQBAJ.","edition":"4"},{"key":"e_1_3_4_83_1","doi-asserted-by":"publisher","DOI":"10.3390\/app13010221"},{"key":"e_1_3_4_84_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148783"},{"key":"e_1_3_4_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3248622"},{"key":"e_1_3_4_86_1","doi-asserted-by":"publisher","DOI":"10.1108\/JSIT-08-2024-0326"},{"key":"e_1_3_4_87_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10799-024-00438-x"},{"key":"e_1_3_4_88_1","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2021.1878393"},{"key":"e_1_3_4_89_1","doi-asserted-by":"publisher","DOI":"10.1080\/0960085X.2024.2345867"},{"key":"e_1_3_4_90_1","doi-asserted-by":"crossref","unstructured":"Quinn S. N. Ivy M. Barrett G. Witte and R. K. Gardner. 2022. Staging Cybersecurity Risks for Enterprise Risk Management and Governance Oversight NIST IR 8286C. Gaithersburg MD: National Institute of Standards and Technology (U.S.). https:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2025\/NIST.IR.8286Cr1.ipd.pdf.","DOI":"10.6028\/NIST.IR.8286C"},{"key":"e_1_3_4_91_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iotcps.2023.05.003"},{"key":"e_1_3_4_92_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-207"},{"key":"e_1_3_4_93_1","doi-asserted-by":"publisher","DOI":"10.1016\/0377-2217(94)90222-4"},{"key":"e_1_3_4_94_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2020.0941"},{"key":"e_1_3_4_95_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2023.123094"},{"issue":"10","key":"e_1_3_4_96_1","first-page":"408","article-title":"Institutional Theory","volume":"11","author":"Scott W. R.","year":"2004","unstructured":"Scott, W. R. 2004. \u201cInstitutional Theory.\u201d Encyclopedia of Social Theory 11 (10): 408\u2013414.","journal-title":"Encyclopedia of Social Theory"},{"key":"e_1_3_4_97_1","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2023.3239115"},{"key":"e_1_3_4_98_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.131.2200513"},{"key":"e_1_3_4_99_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-803843-7.00086-7"},{"key":"e_1_3_4_100_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.soc.31.041304.122159"},{"key":"e_1_3_4_101_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.03.027"},{"key":"e_1_3_4_102_1","article-title":"Zero Trust Architecture Implementation Across Industries","author":"Shenouda J.","year":"2024","unstructured":"Shenouda, J. 2024. \u201cZero Trust Architecture Implementation Across Industries.\u201d Cyber-Consult Org. https:\/\/www.cyber-consult.org\/zero-trust-architecture-implementation-across-industries.","journal-title":"Cyber-Consult Org"},{"key":"e_1_3_4_103_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(21)00019-2"},{"key":"e_1_3_4_104_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-11109-2"},{"key":"e_1_3_4_105_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2022.103751"},{"key":"e_1_3_4_106_1","unstructured":"Travis T. P. Christian and K. Matheny. 2024.RACI Matrix for Successful Enterprise Application Governance. New York: Gartner Inc. https:\/\/www.gartner.com\/en\/documents\/5747915."},{"key":"e_1_3_4_107_1","unstructured":"United State Government. 2025. FICAM Is the Foundation for ZT Adoption. https:\/\/www.idmanagement.gov\/zero-trust\/."},{"key":"e_1_3_4_108_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2023.09.010"},{"key":"e_1_3_4_109_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.1.02"},{"key":"e_1_3_4_110_1","doi-asserted-by":"publisher","DOI":"10.1109\/inspect63485.2024.10896155"},{"key":"e_1_3_4_111_1","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2022.2037162"},{"key":"e_1_3_4_112_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-17081-2_13"},{"key":"e_1_3_4_113_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00474"},{"key":"e_1_3_4_114_1","volume-title":"2023 Strategic Roadmap for Zero Trust Security Program Implementation","author":"Watts J.","year":"2023","unstructured":"Watts, J., N. MacDonald, and T. Lintemuth. 2023. 2023 Strategic Roadmap for Zero Trust Security Program Implementation. ID G00774591. Gartner. pdf. https:\/\/www.gartner.com\/document\/code\/774591?ref=authbody&refval=."},{"key":"e_1_3_4_115_1","doi-asserted-by":"publisher","DOI":"10.5465\/amj.2023.4004"},{"key":"e_1_3_4_116_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12268"},{"key":"e_1_3_4_117_1","unstructured":"Winckless C. and N. MacDonald. 2023. \u201cExplaining Zero Trust Security Approaches to Tech Executives.\u201d Gartner Inc. ID G00798851. pdf. https:\/\/www.gartner.com\/document\/4755131?ref=solrAll&refval=405938953&."},{"key":"e_1_3_4_118_1","article-title":"How to Decipher Zero Trust for Your Business","author":"Winckless C.","year":"2022","unstructured":"Winckless, C., and S. Olyaei. 2022. \u201cHow to Decipher Zero Trust for Your Business.\u201d Gartner, Inc. ID G00762685. pdf. https:\/\/www.gartner.com\/document\/4014435?ref=solrAll&refval=357881086.","journal-title":"Gartner, Inc"},{"key":"e_1_3_4_119_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-08027-1"},{"key":"e_1_3_4_120_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2017.1373006"},{"key":"e_1_3_4_121_1","doi-asserted-by":"publisher","DOI":"10.1080\/0960085x.2021.1980444"},{"key":"e_1_3_4_122_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103412"},{"key":"e_1_3_4_123_1","volume-title":"Case Study Research and Applications: Design and Methods","author":"Yin R. K.","year":"2018","unstructured":"Yin, R. K. 2018. Case Study Research and Applications: Design and Methods. 6th ed. Los Angeles: Sage.","edition":"6"},{"key":"e_1_3_4_124_1","doi-asserted-by":"publisher","DOI":"10.3846\/20294913.2014.892037"},{"key":"e_1_3_4_125_1","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2023.2219560"},{"key":"e_1_3_4_126_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12081812"},{"key":"e_1_3_4_127_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3402341"}],"container-title":["Enterprise Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/17517575.2025.2588753","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T22:58:42Z","timestamp":1767740322000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/17517575.2025.2588753"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,21]]},"references-count":126,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,1,2]]}},"alternative-id":["10.1080\/17517575.2025.2588753"],"URL":"https:\/\/doi.org\/10.1080\/17517575.2025.2588753","relation":{},"ISSN":["1751-7575","1751-7583"],"issn-type":[{"value":"1751-7575","type":"print"},{"value":"1751-7583","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,21]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=teis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=teis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2025-01-24","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-11-09","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-11-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"2588753"}}