{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T11:54:09Z","timestamp":1768391649119,"version":"3.49.0"},"reference-count":92,"publisher":"Frontiers Media SA","license":[{"start":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T00:00:00Z","timestamp":1768348800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["frontiersin.org"],"crossmark-restriction":true},"short-container-title":["Front. Artif. Intell."],"abstract":"<jats:sec>\n                    <jats:title>Introduction<\/jats:title>\n                    <jats:p>Privacy has become a significant concern in the digital world, especially concerning the personal data collected by websites and other service providers on the World Wide Web network. One of the significant approaches to enable the individual to control privacy is the privacy policy document, which contains vital information on this matter. Publishing a privacy policy is required by regulation in most Western countries. However, the privacy policy document is a natural free text-based object, usually phrased in a legal language, and rapidly changes, making it consequently relatively hard to understand and almost always neglected by humans.<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Methods<\/jats:title>\n                    <jats:p>This research proposes a novel methodology to receive an unstructured privacy policy text and automatically structure it into predefined parameters. The methodology is based on a two-layer artificial intelligence (AI) process.<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Results<\/jats:title>\n                    <jats:p>In an empirical study that included 49 actual privacy policies from different websites, we demonstrated an average F1-score\u202f&amp;gt;\u202f0.8 where five of six parameters achieved a very high classification accuracy.<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Discussion<\/jats:title>\n                    <jats:p>This methodology can serve both humans and AI agents by addressing issues such as cognitive burden, non-standard formalizations, cognitive laziness, and the dynamics of the document across a timeline, which deters the use of the privacy policy as a resource. The study addresses a critical gap between the present regulations, aiming at enhancing privacy, and the abilities of humans to benefit from the mandatory published privacy policy.<\/jats:p>\n                  <\/jats:sec>","DOI":"10.3389\/frai.2025.1720547","type":"journal-article","created":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T06:40:43Z","timestamp":1768372843000},"update-policy":"https:\/\/doi.org\/10.3389\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Structuring privacy policy: an AI approach"],"prefix":"10.3389","volume":"8","author":[{"given":"Shani","family":"Alkoby","sequence":"first","affiliation":[{"name":"Faculty of Engineering, Industrial Engineering and Management, Ariel University","place":["Ariel, Israel"]}]},{"given":"Ron S.","family":"Hirschprung","sequence":"additional","affiliation":[{"name":"Faculty of Engineering, Industrial Engineering and Management, Ariel University","place":["Ariel, Israel"]}]}],"member":"1965","published-online":{"date-parts":[[2026,1,14]]},"reference":[{"key":"ref1","year":"2023"},{"key":"ref2","year":"2022"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1496","DOI":"10.23919\/MIPRO57284.2023.10159806","article-title":"Privacy notice informativeness: in a search for benchmark","volume-title":"2023 46th MIPRO ICT and Electronics Convention (MIPRO)","author":"Ali\u0107","year":"2023"},{"key":"ref4","first-page":"214","volume-title":"Machine learning algorithms for privacy policy classification: a comparative study","author":"Alshamsan","year":"2022"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"2165","DOI":"10.1145\/3442381.3450048","article-title":"Privacy policies over time: curation and analysis of a million-document dataset","volume-title":"Proceedings of the web conference 2021","author":"Amos","year":"2021"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1145\/1180367.1180378","article-title":"A comparison of two privacy policy languages: EPAL and XACML","volume-title":"Proceedings of the 3rd ACM workshop on Secure web services","author":"Anderson","year":"2006"},{"key":"ref7","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/MIC.2007.45","article-title":"P3P adoption on e-commerce web sites: a survey and analysis","volume":"11","author":"Beatty","year":"2007","journal-title":"IEEE Internet Comput."},{"key":"ref8","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1287\/isre.2019.0900","article-title":"A theory of multilevel information privacy management for the digital era","volume":"31","author":"B\u00e9langer","year":"2020","journal-title":"Inf. Syst. Res."},{"key":"ref9","doi-asserted-by":"publisher","first-page":"103120","DOI":"10.1016\/j.jisa.2022.103120","article-title":"Security policies by design in NoSQL document databases","volume":"65","author":"Blanco","year":"2022","journal-title":"J. Inf. Secur. Appl."},{"key":"ref10","year":"2003"},{"key":"ref11","doi-asserted-by":"publisher","first-page":"74361","DOI":"10.1109\/ACCESS.2019.2919982","article-title":"Security and privacy-preserving challenges of e-health solutions in cloud computing","volume":"7","author":"Chenthara","year":"2019","journal-title":"IEEE Access"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1145\/2381966.2381979","article-title":"A machine learning solution to assess privacy policy completeness: (short paper)","volume-title":"Proceedings of the 2012 ACM workshop on privacy in the electronic society","author":"Costante","year":"2012"},{"key":"ref13","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSECP.2003.1253568","article-title":"P3P: making privacy policies more useful","volume":"1","author":"Cranor","year":"2003","journal-title":"IEEE Secur. Privacy"},{"key":"ref14","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1002\/1944-2866.POI366","article-title":"Privacy expectations of social media users: the role of informed consent in privacy policies","volume":"6","author":"Custers","year":"2014","journal-title":"Policy Internet"},{"key":"ref15","doi-asserted-by":"publisher","first-page":"2053","DOI":"10.1007\/s00607-022-01076-3","article-title":"A systematic mapping study on automated analysis of privacy policies","volume":"104","author":"Del Alamo","year":"2022","journal-title":"Computing"},{"key":"ref16","first-page":"281","volume-title":"Metaverse: security and privacy issues","author":"Di Pietro","year":"2021"},{"key":"ref17","doi-asserted-by":"publisher","first-page":"306","DOI":"10.13165\/ST-14-4-2-05","article-title":"Privacy in digital age: dead or alive?! Regarding the new EU data protection regulations","volume":"4","author":"Dorraji","year":"2014","journal-title":"Soc. Technol."},{"key":"ref18","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1002\/poi3.142","article-title":"From privacy pragmatist to privacy resigned: challenging narratives of rational choice in digital privacy debates","volume":"9","author":"Draper","year":"2017","journal-title":"Policy Internet"},{"key":"ref19","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1109\/TEM.2005.844927","article-title":"Examining internet privacy policies within the context of user privacy values","volume":"52","author":"Earp","year":"2005","journal-title":"IEEE Trans. Eng. Manag."},{"key":"ref20","doi-asserted-by":"publisher","first-page":"826737","DOI":"10.3389\/frai.2022.826737","article-title":"AI technologies, privacy, and security","volume":"5","author":"Elliott","year":"2022","journal-title":"Front. Artif. Intell."},{"key":"ref21","year":"2000"},{"key":"ref22","first-page":"290","article-title":"Transparency through contextual privacy statements","volume-title":"Mensch und Computer 2017 - Workshopband: Spielend einfach interagieren","author":"Feth","year":"2017"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.1109\/EuroSPW59978.2023.00014","article-title":"A human-in-the-loop approach for information extraction from privacy policies under data scarcity","author":"Gebauer","year":"2023"},{"key":"ref24","first-page":"578","volume-title":"A usability study on the privacy policy visualization model","author":"Ghazinour","year":"2016"},{"key":"ref25","year":"2023"},{"key":"ref26","doi-asserted-by":"publisher","first-page":"1375","DOI":"10.1287\/isre.2022.1178","article-title":"Law, economics, privacy: implications of government policies on website and third-party information sharing","volume":"34","author":"Gopal","year":"2023","journal-title":"Inf. Syst. Res."},{"key":"ref27","doi-asserted-by":"publisher","first-page":"108614","DOI":"10.1016\/j.comnet.2021.108614","article-title":"An automatic mechanism to provide privacy awareness and control over unwittingly dissemination of online private information","volume":"202","author":"Guarino","year":"2022","journal-title":"Comput. Netw."},{"key":"ref28","doi-asserted-by":"publisher","first-page":"180448","DOI":"10.1098\/rsos.180448","article-title":"Data availability, reusability, and analytic reproducibility: evaluating the impact of a mandatory open data policy at the journal cognition","volume":"5","author":"Hardwicke","year":"2018","journal-title":"R. Soc. Open Sci."},{"key":"ref29","first-page":"531","article-title":"Polisis: Automated analysis and presentation of privacy policies using deep learning","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Harkous","year":"2018"},{"key":"ref30","doi-asserted-by":"publisher","first-page":"102498","DOI":"10.1016\/j.ijhcs.2020.102498","article-title":"\u201cIt wouldn't happen to me\u201d: privacy concerns and perspectives following the Cambridge analytica scandal","volume":"143","author":"Hinds","year":"2020","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"ref31","doi-asserted-by":"crossref","DOI":"10.2478\/popets-2021-0078","article-title":"Domain name encryption is not enough: Privacy leakage via IP-based website fingerprinting","author":"Hoang","year":"2021"},{"key":"ref32","doi-asserted-by":"publisher","first-page":"480","DOI":"10.2478\/popets-2021-0081","article-title":"Unifying privacy policy detection","volume":"2021","author":"Hosseini","year":"2021","journal-title":"Proc. Priv. Enhanc. Technol."},{"key":"ref33","doi-asserted-by":"publisher","first-page":"100399","DOI":"10.1016\/j.array.2025.100399","article-title":"The role of agentic AI in shaping a smart future: a systematic review","volume":"26","author":"Hosseini","year":"2025","journal-title":"Array"},{"key":"ref34","doi-asserted-by":"publisher","first-page":"1493716","DOI":"10.3389\/frai.2024.1493716","article-title":"Fine-tuning a local LLaMA-3 large language model for automated privacy-preserving physician letter generation in radiation oncology","volume":"7","author":"Hou","year":"2025","journal-title":"Front. Artif. Intell."},{"key":"ref35","doi-asserted-by":"publisher","first-page":"12087","DOI":"10.1088\/1742-6596\/1325\/1\/012087","article-title":"Privacy protection for recommendation system: a survey","volume":"1325","author":"Huang","year":"2019","journal-title":"J. Phys. Conf. Ser."},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1002\/poi3.431","article-title":"Protecting children of the TikTok era: a discourse analysis in the absence of law","volume":"17","author":"Ingber","year":"2024","journal-title":"Policy Internet"},{"key":"ref37","doi-asserted-by":"publisher","first-page":"100356","DOI":"10.1016\/j.array.2024.100356","article-title":"Privacy impact assessments in the wild: a scoping review","volume":"23","author":"Iwaya","year":"2024","journal-title":"Array"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1145\/985692.985752","article-title":"Privacy policies as decision-making tools: an evaluation of online privacy notices","volume-title":"Proceedings of the SIGCHI conference on human factors in computing systems","author":"Jensen","year":"2004"},{"key":"ref39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3555352","article-title":"The internet with privacy policies: measuring the web upon consent","volume":"16","author":"Jha","year":"2022","journal-title":"ACM Trans. Web"},{"key":"ref40","doi-asserted-by":"publisher","first-page":"61656","DOI":"10.1109\/ACCESS.2019.2916503","article-title":"A review of secure and privacy-preserving medical data sharing","volume":"7","author":"Jin","year":"2019","journal-title":"IEEE Access"},{"key":"ref41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.17485\/ijst\/2019\/v12i29\/146977","article-title":"Cambridge analytica--a case study","volume":"12","author":"Kanakia","year":"2019","journal-title":"Indian J. Sci. Technol."},{"key":"ref42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3372296","article-title":"The dilemma of user engagement in privacy notices: effects of interaction modes and habituation on user attention","volume":"23","author":"Karegar","year":"2020","journal-title":"ACM Trans. Privacy Secur."},{"key":"ref43","author":"Klusait\u0117","year":"2024"},{"key":"ref44","first-page":"388","article-title":"Readability of privacy policies","volume-title":"IFIP annual conference on data and applications security and privacy","author":"Krumay","year":"2020"},{"key":"ref45","article-title":"A survey of privacy policy languages","volume-title":"Workshop on usable IT security management (USM 07): proceedings of the 3rd symposium on usable privacy and security","author":"Kumaraguru","year":"2007"},{"key":"ref46","doi-asserted-by":"publisher","first-page":"231130","DOI":"10.1098\/rsos.231130","article-title":"Accelerating AI for science: open data science for science","volume":"11","author":"Lawrence","year":"2024","journal-title":"R. Soc. Open Sci."},{"key":"ref47","doi-asserted-by":"publisher","first-page":"102249","DOI":"10.1016\/j.isci.2021.102249","article-title":"Ethical machines: the human-centric use of artificial intelligence","volume":"24","author":"Lepri","year":"2021","journal-title":"IScience"},{"key":"ref49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/1097198X.2019.1569186","article-title":"The impact of GDPR on global technology development","volume":"22","author":"Li","year":"2019","journal-title":"J. Glob. Inf. Technol. Manag."},{"key":"ref50","article-title":"The privacy policy landscape after the GDPR","author":"Linden","year":"2019"},{"key":"ref51","doi-asserted-by":"publisher","first-page":"833","DOI":"10.1109\/TIFS.2018.2866309","article-title":"Retrieving hidden friends: a collusion privacy attack against online friend search engine","volume":"14","author":"Liu","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref52","doi-asserted-by":"publisher","first-page":"1472","DOI":"10.1080\/1369118X.2017.1339726","article-title":"The role of privacy concerns in the sharing economy","volume":"21","author":"Lutz","year":"2018","journal-title":"Inf. Commun. Soc."},{"key":"ref53","first-page":"639","article-title":"SMOG grading-a new readability formula","volume":"12","author":"Mc Laughlin","year":"1969","journal-title":"J. Read."},{"key":"ref54","first-page":"543","article-title":"The cost of reading privacy policies","volume":"4","author":"McDonald","year":"2008","journal-title":"Isjlp"},{"key":"ref55","year":"2023"},{"key":"ref56","first-page":"287","article-title":"Researchers\u2019 experiences in analyzing privacy policies: challenges and opportunities","volume-title":"Proceedings on privacy enhancing technologies","author":"Mhaidli","year":"2023"},{"key":"ref57","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/s10982-017-9307-3","article-title":"Privacy and autonomy: on some misconceptions concerning the political dimensions of privacy","volume":"37","author":"Mokrosinska","year":"2018","journal-title":"Law Philos."},{"key":"ref58","doi-asserted-by":"publisher","first-page":"2135","DOI":"10.1002\/sec.1157","article-title":"CAPTCHA and its alternatives: a review","volume":"8","author":"Moradi","year":"2015","journal-title":"Secur. Commun. Netw."},{"key":"ref59","first-page":"1600","volume-title":"Trend analysis of cyber security research published in HFES proceedings from 1980 to 2018","author":"Mouloua","year":"2019"},{"key":"ref60","doi-asserted-by":"publisher","first-page":"1000294","DOI":"10.4172\/2168-9601.1000294","article-title":"Data privacy issues and possible solutions in E-commerce","volume":"7","author":"Muneer","year":"2018","journal-title":"J. Account. Market."},{"key":"ref61","year":"2023"},{"key":"ref62","volume-title":"Islands of privacy","author":"Nippert-Eng","year":"2019"},{"key":"ref63","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1016\/j.comnet.2014.08.023","article-title":"Distributing privacy policies over multimedia content across multiple online social networks","volume":"75","author":"Patsakis","year":"2014","journal-title":"Comput. Netw."},{"key":"ref64","first-page":"112","article-title":"Mobile applications security: an overview and current trend","volume-title":"Proceedings of national conference on research in higher education, learning and administration","author":"Paul","year":"2019"},{"key":"ref65","doi-asserted-by":"crossref","first-page":"428","DOI":"10.4018\/978-1-7998-3479-3.ch031","article-title":"A utility theory of privacy and information sharing","volume-title":"Encyclopedia of information science and technology","author":"Puaschunder","year":"2021"},{"key":"ref66","doi-asserted-by":"publisher","first-page":"111412","DOI":"10.1016\/j.isci.2024.111412","article-title":"Comprehensive location privacy enhanced model","volume":"27","author":"Qing","year":"2024","journal-title":"iScience"},{"key":"ref67","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1080\/13691180210159328","article-title":"Privacy as a common good in the digital world","volume":"5","author":"Regan","year":"2002","journal-title":"Inf. Commun. Soc."},{"key":"ref68","doi-asserted-by":"publisher","first-page":"102896","DOI":"10.1016\/j.jisa.2021.102896","article-title":"Guidelines for GDPR compliance in big data systems","volume":"61","author":"Rhahla","year":"2021","journal-title":"J. Inf. Secur. Appl."},{"key":"ref69","doi-asserted-by":"publisher","first-page":"100243","DOI":"10.1016\/j.invent.2019.100243","article-title":"Availability, readability, and content of privacy policies and terms of agreements of mental health apps","volume":"17","author":"Robillard","year":"2019","journal-title":"Internet Interv."},{"key":"ref70","volume-title":"The usable privacy policy project","author":"Sadeh","year":"2013"},{"key":"ref71","volume-title":"Looking back at P3P: lessons for the future","author":"Schwartz","year":"2009"},{"key":"ref72","doi-asserted-by":"publisher","first-page":"103963","DOI":"10.1016\/j.cose.2024.103963","article-title":"Measuring privacy policy compliance in the Alexa ecosystem: in-depth analysis","volume":"144","author":"Shafei","year":"2024","journal-title":"Comput. Secur."},{"key":"ref73","doi-asserted-by":"publisher","first-page":"167123","DOI":"10.1109\/ACCESS.2020.3022661","article-title":"Security, privacy and trust for smart mobile-internet of things (M-IoT): a survey","volume":"8","author":"Sharma","year":"2020","journal-title":"IEEE Access"},{"key":"ref74","first-page":"162","article-title":"Going against the (appropriate) flow: a contextual integrity approach to privacy policy analysis","volume-title":"Proceedings of the AAAI conference on human computation and crowdsourcing","author":"Shvartzshnaider","year":"2019"},{"key":"ref75","doi-asserted-by":"publisher","first-page":"33","DOI":"10.5465\/AMP.2009.45590139","article-title":"Monitoring employee e-mails: is there any room for privacy?","volume":"23","author":"Smith","year":"2009","journal-title":"Acad. Manag. Perspect."},{"key":"ref76","article-title":"Privacy at scale: introducing the privaseer corpus of web privacy policies","author":"Srinath","year":"2020"},{"key":"ref77","doi-asserted-by":"publisher","first-page":"992","DOI":"10.1016\/j.chb.2015.09.038","article-title":"\u201cI agree to the terms and conditions\u201d:(how) do users read privacy policies online? An eye-tracking experiment","volume":"55","author":"Steinfeld","year":"2016","journal-title":"Comput. Hum. Behav."},{"key":"ref78","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1287\/isre.1090.0260","article-title":"The effect of online privacy information on purchasing behavior: an experimental study","volume":"22","author":"Tsai","year":"2011","journal-title":"Inf. Syst. Res."},{"key":"ref79","year":"2023"},{"key":"ref80","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/j.chb.2017.10.007","article-title":"Security and privacy in online social networking: risk perceptions and precautionary behaviour","volume":"78","author":"Van Schaik","year":"2018","journal-title":"Comput. Hum. Behav."},{"key":"ref81","year":"2020"},{"key":"ref82","year":"2018"},{"key":"ref83","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3590152","article-title":"Privacy policies across the ages: content of privacy policies 1996--2021","volume":"26","author":"Wagner","year":"2023","journal-title":"ACM Trans. Privacy Secur."},{"key":"ref84","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1145\/3180155.3180196","article-title":"GUILeak: tracing privacy policy claims on user input data for android applications","volume-title":"Proceedings of the 40th international conference on software engineering","author":"Wang","year":"2018"},{"key":"ref85","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3230665","article-title":"Analyzing privacy policies at scale: from crowdsourcing to automated annotations","volume":"13","author":"Wilson","year":"2018","journal-title":"ACM Trans. Web"},{"key":"ref86","doi-asserted-by":"crossref","first-page":"1330","DOI":"10.18653\/v1\/P16-1126","article-title":"The creation and analysis of a website privacy policy corpus","volume-title":"Proceedings of the 54th annual meeting of the association for computational linguistics (Volume 1: Long Papers)","author":"Wilson","year":"2016"},{"key":"ref87","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/MTS.2016.2554419","article-title":"Privacy policy analysis of popular web platforms","volume":"35","author":"Winkler","year":"2016","journal-title":"IEEE Technol. Soc. Mag."},{"key":"ref88","doi-asserted-by":"publisher","first-page":"103997","DOI":"10.1016\/j.cose.2024.103997","article-title":"Enhancing privacy policy comprehension through Privacify: A user-centric approach using advanced language models","volume":"145","author":"Woodring","year":"2024","journal-title":"Comput. Secur."},{"key":"ref89","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.knosys.2014.02.019","article-title":"Knowledge augmented policy conflict analysis for services collaboration","volume":"62","author":"Wu","year":"2014","journal-title":"Knowl.-Based Syst."},{"key":"ref90","doi-asserted-by":"publisher","first-page":"106952","DOI":"10.1016\/j.knosys.2021.106952","article-title":"An effective approach for the protection of user commodity viewing privacy in e-commerce website","volume":"220","author":"Wu","year":"2021","journal-title":"Knowl.-Based Syst."},{"key":"ref91","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1145\/2103621.2103669","article-title":"A language for automatically enforcing privacy policies","volume":"47","author":"Yang","year":"2012","journal-title":"ACM SIGPLAN Not."},{"key":"ref92","first-page":"291","volume-title":"Privacycheck\u2019s machine learning to digest privacy policies: competitor analysis and usage patterns","author":"Zaeem","year":"2020"},{"key":"ref93","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.jnca.2017.10.022","article-title":"On location-privacy in opportunistic mobile networks, a survey","volume":"103","author":"Zakhary","year":"2018","journal-title":"J. Netw. Comput. Appl."}],"container-title":["Frontiers in Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/frai.2025.1720547\/full","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T06:40:48Z","timestamp":1768372848000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/frai.2025.1720547\/full"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,14]]},"references-count":92,"alternative-id":["10.3389\/frai.2025.1720547"],"URL":"https:\/\/doi.org\/10.3389\/frai.2025.1720547","relation":{},"ISSN":["2624-8212"],"issn-type":[{"value":"2624-8212","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,14]]},"article-number":"1720547"}}