{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T19:10:30Z","timestamp":1770491430043,"version":"3.49.0"},"reference-count":53,"publisher":"Springer Fachmedien Wiesbaden GmbH","issue":"2","license":[{"start":{"date-parts":[[2021,2,22]],"date-time":"2021-02-22T00:00:00Z","timestamp":1613952000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,2,22]],"date-time":"2021-02-22T00:00:00Z","timestamp":1613952000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Hochschule f\u00fcr Technik und Wirtschaft Dresden (HTW)"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["HMD"],"published-print":{"date-parts":[[2021,4]]},"abstract":"<jats:title>Zusammenfassung<\/jats:title><jats:p>In diesem Beitrag werden die Rolle digitaler Identit\u00e4ten f\u00fcr eine funktionierende digitale Wirtschaft thematisiert und Anforderungen an das Management digitaler Identit\u00e4ten abgeleitet. Bislang hat sich kein Ansatz f\u00fcr das Management digitaler Identit\u00e4ten in der Breite etabliert, was zu einer Fragmentierung der ID-Landschaft sowie einer Vielzahl von Benutzerkonten f\u00fcr den Anwender f\u00fchrt. Mangels Standards ist zudem die Interoperabilit\u00e4t von digitalen Identit\u00e4ten eingeschr\u00e4nkt. Dies f\u00fchrt zu einer Reihe von Problemen, die den effizienten und sicheren Umgang mit digitalen Identit\u00e4ten behindern. Abhilfe verspricht das Konzept der Self-Sovereign Identities (SSI) und den damit verbundenen Standards \u201eVerifiable Credentials\u201c und \u201eDecentralized Identifiers\u201c. Sie erlauben den flexiblen Austausch von manipulationssicheren digitalen Nachweisen zwischen Benutzern und Systemen und bilden damit die Grundlage f\u00fcr den Aufbau von Vertrauensbeziehungen im digitalen Raum. In diesem Beitrag werden das SSI-Paradigma vorgestellt und die H\u00fcrden diskutiert, die dem breitenwirksamen Einsatz dieses Konzepts entgegenstehen. Damit erh\u00e4lt der Leser einen kompakten \u00dcberblick verschiedener Ans\u00e4tze f\u00fcr das Identit\u00e4tsmanagement und die Potenziale selbst-souver\u00e4ner Identit\u00e4ten. F\u00fcr die Gestaltung digitaler Dienste in Wirtschaft und Verwaltung sollte dieser Ansatz st\u00e4rker ber\u00fccksichtigt werden, um von den damit verbundenen Vorteilen zu profitieren.<\/jats:p>","DOI":"10.1365\/s40702-021-00711-5","type":"journal-article","created":{"date-parts":[[2021,2,22]],"date-time":"2021-02-22T18:02:46Z","timestamp":1614016966000},"page":"247-270","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Self-Sovereign Identity als Grundlage f\u00fcr universell einsetzbare digitale Identit\u00e4ten","Self-Sovereign Identity as the Basis for Universally Applicable Digital Identities"],"prefix":"10.1365","volume":"58","author":[{"given":"Tobias","family":"Ehrlich","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Richter","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Meisel","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9324-9387","authenticated-orcid":false,"given":"J\u00fcrgen","family":"Anke","sequence":"additional","affiliation":[]}],"member":"93","published-online":{"date-parts":[[2021,2,22]]},"reference":[{"key":"711_CR1","unstructured":"Allen C (2016) The path to self-sovereign identity. http:\/\/www.lifewithalacrity.com\/2016\/04\/the-path-to-self-soverereign-identity.html. Zugegriffen: 15.04.2020"},{"key":"711_CR2","volume-title":"Die eIDAS-Verordnung \u2013 die Basis f\u00fcr ein starkes digitales Europa; Effizientere Prozesse, geringere Kosten, mehr Kundenzufriedenheit","author":"BDR","year":"2018","unstructured":"BDR (2018) Die eIDAS-Verordnung \u2013 die Basis f\u00fcr ein starkes digitales Europa; Effizientere Prozesse, geringere Kosten, mehr Kundenzufriedenheit. Bundesdruckerei, https:\/\/www.bundesdruckerei.de\/de\/whitepaper\/download\/859\/whitepaper-eIDAS.pdf.pdf. Zugegriffen: 20.08.2020"},{"key":"711_CR3","unstructured":"Bleich H (2019) Identit\u00e4tsklau nimmt zu und wird raffinierter. https:\/\/www.heise.de\/hintergrund\/Identitaetsklau-nimmt-zu-und-wird-raffinierter-4305746.html. Zugegriffen: 28.01.21"},{"key":"711_CR4","unstructured":"BMI (2020a) Der Personalausweis. https:\/\/www.personalausweisportal.de\/Webs\/PA\/DE\/buergerinnen-und-buerger\/der-personalausweis\/der-personalausweis-node.html. Zugegriffen: 28. Nov. 2020"},{"key":"711_CR5","unstructured":"BMI (2020b) FAQ \u2013 eID Diensteanbieter werden. https:\/\/www.personalausweisportal.de\/SharedDocs\/faqs\/Webs\/PA\/DE\/Dienstanbieter-werden\/Diensteanbieter-werden.html. Zugegriffen: 26. Nov. 2020"},{"key":"711_CR6","unstructured":"BMWi (2021) Schaufenster Sichere Digitale Identit\u00e4ten. http:\/\/www.schaufenster-sdi.de\/. Zugegriffen: 25. Jan. 2021"},{"key":"711_CR47","series-title":"arXiv e-prints:arXiv:1904.12816","volume-title":"Self-sovereign identity solutions: the necessity of Blockchain technology","author":"D van Bokkem","year":"2019","unstructured":"van Bokkem\u00a0D, Hageman\u00a0R, Koning\u00a0G, Nguyen\u00a0L, Zarin\u00a0N (2019) Self-sovereign identity solutions: the necessity of Blockchain technology. arXiv e\u2011prints:arXiv:1904.12816"},{"key":"711_CR7","unstructured":"BSI (2016) Elektronische Identifizierung. Bundesamt f\u00fcr Sicherheit in der Informationstechnik. https:\/\/www.bsi.bund.de\/DE\/Themen\/DigitaleGesellschaft\/eIDAS\/Elektronische_Identifizierung\/Elektronische_Identifizierung_node.html. Zugegriffen: 01.08.2020"},{"key":"711_CR8","unstructured":"BSI (2017) eIDAS-Notifizierung der Online-Ausweisfunktion. Bundesamt f\u00fcr Sicherheit in der Informationstechnik. https:\/\/www.bsi.bund.de\/DE\/Themen\/DigitaleGesellschaft\/ElektronischeIdentitaeten\/Online-Ausweisfunktion\/eIDAS-Notifizierung\/eIDAS-Notifikation_node.html. Zugegriffen: 26.11.2020"},{"key":"711_CR9","unstructured":"Bundesregierung Deutschland (2017) Gesetz zur F\u00f6rderung des elektronischen Identit\u00e4tsnachweises. http:\/\/www.bgbl.de\/xaver\/bgbl\/start.xav?startbk=Bundesanzeiger_BGBl&jumpTo=bgbl117s2310.pdf. Zugegriffen: 28.11.2020"},{"key":"711_CR10","unstructured":"CEF Digital (2020a) EBSI documentation home. https:\/\/ec.europa.eu\/cefdigital\/wiki\/display\/CEFDIGITALEBSI\/EBSI+Documentation+home. Zugegriffen: 29.08.2020"},{"key":"711_CR11","unstructured":"CEF Digital (2020b) European Blockchain Services Infrastructure (EBSI). https:\/\/ec.europa.eu\/cefdigital\/wiki\/display\/CEFDIGITAL\/EBSI. Zugegriffen: 20.08.2020"},{"key":"711_CR12","unstructured":"CEF Digital (2020c) Get Started EBSI. https:\/\/ec.europa.eu\/cefdigital\/wiki\/display\/CEFDIGITAL\/Get+Started+EBSI. Zugegriffen: 12.09.2020"},{"key":"711_CR13","volume-title":"EU Blockchain Observatory and Forum 2018\u20132020","author":"L Courcelas","year":"2020","unstructured":"Courcelas\u00a0L, Lyons\u00a0T, Timsit\u00a0K (2020) Conclusions and reflections. In: EU Blockchain Observatory and Forum 2018\u20132020"},{"key":"711_CR14","unstructured":"Cyphers B, Gebhart G (2019) Behind the one-way mirror: a deep dive into the technology of corporate surveillance. https:\/\/www.eff.org\/wp\/behind-the-one-way-mirror. Zugegriffen: 28.01.2021"},{"key":"711_CR15","unstructured":"Davie M, Gisolfi D, Hardman D, Jordan J, O\u2019Donnell D, Reed D, van Deventer O (2019) Aries RFC 0289: Trust over IP Stack. HYPERLEDGER. https:\/\/github.com\/hyperledger\/aries-rfcs\/tree\/master\/concepts\/0289-toip-stack. Zugegriffen: 03.08.2020"},{"key":"711_CR16","unstructured":"DIF (2020) Universal resolver. https:\/\/github.com\/decentralized-identity\/universal-resolver. Zugegriffen: 27.11.2020"},{"key":"711_CR17","volume-title":"Self Sovereign Identity Use Cases \u2013 von der Vision in die Praxis","author":"A Doerk","year":"2020","unstructured":"Doerk\u00a0A, Hansen\u00a0P, J\u00fcrgens\u00a0G, Kaminski\u00a0M, Kubach\u00a0M, Terbu\u00a0O (2020) Self Sovereign Identity Use Cases \u2013 von der Vision in die Praxis. Bundesverband Informationswirtschaft, Telekommunikation und neue Medien e.\u202fV., https:\/\/www.bitkom.org\/Bitkom\/Publikationen\/Self-Sovereign-Identity-Use-Cases. Zugegriffen: 30.07.2020"},{"key":"711_CR18","unstructured":"Domingo IA (2020) SSI eIDAS legal report; how eIDAS can legally support digital identity and trustworthy DLT-based transactions in the digital single market. https:\/\/joinup.ec.europa.eu\/sites\/default\/files\/document\/2020-04\/SSI_eIDAS_legal_report_final_0.pdf. Zugegriffen: 28.08.2020"},{"key":"711_CR19","unstructured":"ESATUS AG (2019) Identity & Access Management (IAM) \u2013 Realisiert mit Self-Sovereign Identity (SSI). https:\/\/esatus.com\/files\/whitepapers\/Whitepaper-IAM-realisiert-mit-SSI-201908.pdf. Zugegriffen: 18.08.2020"},{"key":"711_CR20","doi-asserted-by":"publisher","first-page":"103059","DOI":"10.1109\/ACCESS.2019.2931173","volume":"7","author":"MS Ferdous","year":"2019","unstructured":"Ferdous\u00a0MS, Chowdhury\u00a0F, Alassafi\u00a0MO (2019) In search of self-sovereign identity leveraging blockchain technology. IEEE Access 7:103059\u2013103079. https:\/\/doi.org\/10.1109\/ACCESS.2019.2931173","journal-title":"IEEE Access"},{"key":"711_CR21","unstructured":"Freda D (2019) Am seidenen Faden unseres Digitalisierungsniveaus. GS1 Innovation. https:\/\/www.gs1-germany.de\/innovation\/blockchain-blog\/peer-to-peer-netzabdeckung-als-show-stopper\/. Zugegriffen: 04.08.2020"},{"key":"711_CR22","volume-title":"Multichain: ten enterprise blockchains. That actually work","author":"G Greenspan","year":"2019","unstructured":"Greenspan\u00a0G (2019) Multichain: ten enterprise blockchains. That actually work. Hilton Midtown, New York"},{"key":"711_CR23","unstructured":"Habel P (2019) Xride: Erstes Blockchain-basiertes Elektromobilit\u00e4tsprojekt seiner Art. https:\/\/www.telekom.com\/de\/medien\/medieninformationen\/detail\/xride-erstes-blockchain-basiertes-elektromobilitaetsprojekt-seiner-art-580924. Zugegriffen: 12.09.2020"},{"key":"711_CR24","unstructured":"Hardman D (2020a) Aries RFC 0430: machine-readable governance frameworks. Trust Over IP Foundation. https:\/\/github.com\/hyperledger\/aries-rfcs\/tree\/master\/concepts\/0430-machine-readable-governance-frameworks. Zugegriffen: 10.08.2020"},{"key":"711_CR25","unstructured":"Hardman D (2020b) DIDComm Messaging specification. Decentralized Identity Foundation. https:\/\/identity.foundation\/didcomm-messaging\/spec\/. Zugegriffen: 22.11.2020"},{"key":"711_CR27","unstructured":"Jolocom (2020) Jolocom SSI in Bundesdruckerei\u2019s e\u2011government proof of concept. https:\/\/jolocom.io\/blog\/jolocom-self-sovereign-identities-at-work-in-bundesdruckerei-proof-of-concept-for-e-government\/. Zugegriffen: 30.11.2020"},{"key":"711_CR26","volume-title":"Test drive your self-sovereign identity \u2013 Jolocom","author":"Jolocom","year":"2019","unstructured":"Jolocom (2019) Test drive your self-sovereign identity \u2013 Jolocom. Jolocom, https:\/\/stories.jolocom.com\/test-drive-your-self-sovereign-identity-9a8b2566aa1b. Zugegriffen: 30.11.2020"},{"key":"711_CR28","unstructured":"J\u00f8sang A, Pope S (2005) User centric identity management. http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.60.1563&rep=rep1&type=pdf. Zugegriffen: 25.11.2020"},{"key":"711_CR29","first-page":"519","volume-title":"Informatik 2016. Tagung vom 26.\u201330. September 2016 in Klagenfurt","author":"S Kostic","year":"2016","unstructured":"Kostic\u00a0S, Heinemann\u00a0A, Margraf\u00a0M (2016in) Usability-Untersuchung eines Papierprototypen f\u00fcr eine mobile Online-Ausweisfunktion des Personalausweises. In: Mayr\u00a0HC, Pinzger\u00a0M (Hrsg) Informatik 2016. Tagung vom 26.\u201330. September 2016 in Klagenfurt. Gesellschaft f\u00fcr Informatik e.V., Bonn, S 519\u2013527"},{"key":"711_CR30","volume-title":"Epic Games to lose Apple ID sign on for accounts","author":"C Kwan","year":"2020","unstructured":"Kwan\u00a0C (2020) Epic Games to lose Apple ID sign on for accounts. ZDNet, https:\/\/www.zdnet.com\/article\/epic-games-to-lose-apple-id-sign-on-for-accounts\/. Zugegriffen: 28.11.2020"},{"key":"711_CR31","doi-asserted-by":"crossref","unstructured":"M\u00fchle A, Gr\u00fcner A, Gayvoronskaya T, Meinel C (2018) A survey on essential components of a\u00a0self-sovereign identity. https:\/\/arxiv.org\/pdf\/1807.06346. Zugegriffen: 30.11.2020","DOI":"10.1016\/j.cosrev.2018.10.002"},{"key":"711_CR32","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-658-25398-1_5","volume-title":"Cyber-Sicherheit. Das Lehrbuch f\u00fcr Konzepte, Prinzipien, Mechanismen, Architekturen und Eigenschaften von CyberSicherheitssystemen in der Digitalisierung","author":"N Pohlmann","year":"2019","unstructured":"Pohlmann\u00a0N (2019a) Identifikation und Authentifikation. In: Pohlmann\u00a0N (Hrsg) Cyber-Sicherheit. Das Lehrbuch f\u00fcr Konzepte, Prinzipien, Mechanismen, Architekturen und Eigenschaften von CyberSicherheitssystemen in der Digitalisierung. Springer, Wiesbaden, S 151\u2013211"},{"key":"711_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-658-25398-1","volume-title":"Cyber-Sicherheit. Das Lehrbuch f\u00fcr Konzepte, Prinzipien, Mechanismen, Architekturen und Eigenschaften von CyberSicherheitssystemen in der Digitalisierung","author":"N Pohlmann","year":"2019","unstructured":"Pohlmann\u00a0N (2019b) Sichtweisen auf die Cyber-Sicherheit. In: Pohlmann\u00a0N (Hrsg) Cyber-Sicherheit. Das Lehrbuch f\u00fcr Konzepte, Prinzipien, Mechanismen, Architekturen und Eigenschaften von CyberSicherheitssystemen in der Digitalisierung. Springer, Wiesbaden, S 1\u201342"},{"key":"711_CR34","first-page":"33","volume-title":"Digital privacy. PRIME\u2014privacy and identity management for Europe","author":"B Priem","year":"2011","unstructured":"Priem\u00a0B, Leenes\u00a0R, Kosta\u00a0E, Kuczerawy\u00a0A (2011) The identity landscape. In: Camenisch\u00a0J, Leenes\u00a0R, Sommer\u00a0D (Hrsg) Digital privacy. PRIME\u2014privacy and identity management for Europe. Springer, Berlin, S\u00a033\u201351"},{"key":"711_CR35","volume-title":"Internet.Macht.Zukunft: Wie die Vernetzung die Mobilit\u00e4t revolutioniert","author":"HL Prinzler","year":"2019","unstructured":"Prinzler\u00a0HL (2019) Internet.Macht.Zukunft: Wie die Vernetzung die Mobilit\u00e4t revolutioniert. https:\/\/www.imdb.com\/title\/tt12993446\/. Zugegriffen: 12.09.2020"},{"key":"711_CR37","unstructured":"Reed D, Sporny M, Longley D, Allen C, Grant R, Sabadello M, Holt J (2021) Decentralized identifiers (DIDs). https:\/\/www.w3.org\/TR\/did-core\/. Zugegriffen: 18.01.2021"},{"key":"711_CR36","unstructured":"Reed D, Windley P (2018) Sovrin; a protocol and token for self-sovereign identity and decentralized trust. https:\/\/sovrin.org\/wp-content\/uploads\/Sovrin-Protocol-and-Token-White-Paper.pdf. Zugegriffen: 13.07.2020"},{"key":"711_CR38","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/978-3-658-27029-2_2","volume-title":"Verwaltung, eGovernment und Digitalisierung","author":"J Riedel","year":"2019","unstructured":"Riedel\u00a0J (2019) Identit\u00e4ten als Schl\u00fcsselfaktor f\u00fcr medienbruchfreie digitale Prozesse. In: Schmid\u00a0A (Hrsg) Verwaltung, eGovernment und Digitalisierung. Springer, Wiesbaden, S\u00a023\u201330"},{"key":"711_CR39","unstructured":"Ries U (2019) Studie zu Darknet-Preisen: Daten von Europ\u00e4ern sind teuer. https:\/\/www.heise.de\/newsticker\/meldung\/Studie-zu-Darknet-Preisen-Daten-von-Europaeern-sind-teuer-4560072.html. Zugegriffen: 28.01.2021"},{"key":"711_CR40","unstructured":"Sopek M (2020) New services for LEI owners. https:\/\/lei.info\/portal\/new-services-for-lei-owners\/. Zugegriffen: 29. Aug. 2020"},{"key":"711_CR41","unstructured":"Sporny M, Longley D, Chadwick D (2019) Verifiable credentials data model 1.0. https:\/\/www.w3.org\/TR\/vc-data-model\/#lifecycle-details. Zugegriffen: 13.08.2020"},{"key":"711_CR42","unstructured":"Steele O, Sporny M (2021) DID specification registries\u2014DID methods. https:\/\/w3c.github.io\/did-spec-registries\/#did-methods. Zugegriffen: 18.01.2021"},{"key":"711_CR43","unstructured":"The Sovrin Foundation (2020) Innovation meets compliance; data privacy regulation and distributed ledger technology. https:\/\/sovrin.org\/wp-content\/uploads\/GDPR-Paper_V1.pdf. Zugegriffen: 28.01.2021"},{"key":"711_CR44","unstructured":"Tobin A (2018) Sovrin: what goes on the ledger. https:\/\/www.evernym.com\/wp-content\/uploads\/2017\/07\/What-Goes-On-The-Ledger.pdf. Zugegriffen: 13.07.2020"},{"key":"711_CR45","volume-title":"Rollen und Berechtigungskonzepte","year":"2017","unstructured":"Tsolkas\u00a0A, Schmidt\u00a0K (Hrsg) (2017) Rollen und Berechtigungskonzepte. Springer, Wiesbaden"},{"key":"711_CR46","unstructured":"Uhde T (2018) Technologische Erw\u00e4gungen f\u00fcr den weiterf\u00fchrenden Einsatz. SAP. https:\/\/www.gs1-germany.de\/index.php?id=5193. Zugegriffen: 4.08.2020"},{"key":"711_CR48","unstructured":"van Deventer O (2019) EU Project eSSIF-Lab, aimed at faster and safer electronic transactions via the internet as well as in real life, open for start-ups and SMEs. https:\/\/www.tno.nl\/en\/about-tno\/news\/2019\/12\/essif-lab\/. Zugegriffen: 29.08.2020"},{"key":"711_CR49","unstructured":"Vila X (2020) eIDAS Bridge. Use cases and technical specifications. https:\/\/joinup.ec.europa.eu\/sites\/default\/files\/document\/2020-04\/SSI%20eIDAS%20Bridge%20-%20Use%20\u00a0cases%20and%20Technical%20Specifications%20v1.pdf. Zugegriffen: 11.08.2020"},{"key":"711_CR50","unstructured":"Windley P (2018) Multi-source and self-sovereign identity. https:\/\/www.windley.com\/archives\/2018\/09\/multi-source_and_self-sovereign_identity.shtml. Zugegriffen: 13.08.2020"},{"key":"711_CR51","unstructured":"Windley P (2020) The Sovrin SSI stack. https:\/\/www.windley.com\/archives\/2020\/03\/the_sovrin_ssi_stack.shtml. Zugegriffen: 19.08.2020"},{"key":"711_CR52","unstructured":"Winter H, Gerling J, Roth K (2020) Nutzung elektronischer Identifzierungsmittel (eIDs) im elektronischen Zahlungsverkehr und bei der Kontoer\u00f6ffnung. https:\/\/www.bundesbank.de\/resource\/blob\/820850\/8f7ff5fca3fe5d823f7f10a30752b31f\/mL\/bericht-eids-elekronischer-zahlungsverkehr-data.pdf. Zugegriffen: 27.11.2020"},{"key":"711_CR53","unstructured":"Wunsch A (2018) Nagelprobe Praxistest: Erkenntnisse aus dem echten Leben. https:\/\/www.gs1-germany.de\/innovation\/blockchain-blog\/nagelprobe-praxistest-erkenntnisse-aus-dem-echten-leben\/. Zugegriffen: 04.08.2020"}],"container-title":["HMD Praxis der Wirtschaftsinformatik"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-021-00711-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1365\/s40702-021-00711-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-021-00711-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T16:08:37Z","timestamp":1618502917000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1365\/s40702-021-00711-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,22]]},"references-count":53,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["711"],"URL":"https:\/\/doi.org\/10.1365\/s40702-021-00711-5","relation":{},"ISSN":["1436-3011","2198-2775"],"issn-type":[{"value":"1436-3011","type":"print"},{"value":"2198-2775","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,22]]},"assertion":[{"value":"30 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 February 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 February 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}