{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T15:31:51Z","timestamp":1771515111436,"version":"3.50.1"},"reference-count":73,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T00:00:00Z","timestamp":1754956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100008406","name":"Newcastle University","doi-asserted-by":"publisher","award":["220660091"],"award-info":[{"award-number":["220660091"]}],"id":[{"id":"10.13039\/501100008406","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers"],"abstract":"<jats:p>As cyber threats such as phishing and ransomware continue to escalate, healthcare systems are facing significant challenges in protecting sensitive data and ensuring operational continuity. This study explores how email communication practices influence cybersecurity in Saudi Arabia\u2019s healthcare sector, particularly within the framework of rapid digitalisation under Vision 2030. The research employs a qualitative approach, with semi-structured interviews conducted with 40 healthcare professionals across various hospitals. A phenomenological analysis of the data revealed several key vulnerabilities, including inconsistent cybersecurity training, a reliance on informal messaging apps, and limited awareness of phishing tactics. The inconsistent cybersecurity training across regions emerged as a major weakness affecting overall resilience. These findings, grounded in rich qualitative data, offer a significant standalone contribution to understanding cybersecurity in healthcare settings. The findings highlight the need for mandatory training and awareness programmes and policy reforms to enhance cyber resilience within healthcare settings.<\/jats:p>","DOI":"10.3390\/computers14080324","type":"journal-article","created":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T16:30:36Z","timestamp":1755016236000},"page":"324","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Cybersecurity Threats in Saudi Healthcare: Exploring Email Communication Practices to Enhance Cybersecurity Among Healthcare Employees in Saudi Arabia"],"prefix":"10.3390","volume":"14","author":[{"given":"Ebtesam","family":"Shadadi","sequence":"first","affiliation":[{"name":"Department of Computer Science, College of Engineering & Computer Science, Jazan University, Jazan 45142, Saudi Arabia"}]},{"given":"Rasha","family":"Ibrahim","sequence":"additional","affiliation":[{"name":"Department School of Computing, Newcastle University, Newcastle NE1 7RU, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4897-0180","authenticated-orcid":false,"given":"Essam","family":"Ghadafi","sequence":"additional","affiliation":[{"name":"Department School of Computing, Newcastle University, Newcastle NE1 7RU, UK"}]}],"member":"1968","published-online":{"date-parts":[[2025,8,12]]},"reference":[{"key":"ref_1","unstructured":"IBM (2025, August 01). Cost of a Data Breach Report 2022. Available online: https:\/\/www.key4biz.it\/wp-content\/uploads\/2022\/07\/Cost-of-a-Data-Breach-Full-Report-2022.pdf."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"3","DOI":"10.63180\/jcsra.thestap.2023.1.2","article-title":"Towards Trustworthy IoT Systems: Cybersecurity Threats, Frameworks, and Future Directions","volume":"2023","author":"Alsalem","year":"2023","journal-title":"J. Cyber Secur. Risk Audit."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"12","DOI":"10.63180\/jcsra.thestap.2025.2.2","article-title":"Analyzing cybersecurity risks and threats in IT infrastructure based on NIST framework","volume":"2025","author":"Aljumaiah","year":"2025","journal-title":"J. Cyber Secur. Risk Audit."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Aljeaid, D., Alzhrani, A., Alrougi, M., and Almalki, O. (2020). Assessment of end-user susceptibility to cybersecurity threats in Saudi Arabia by simulating phishing attacks. Information, 11.","DOI":"10.3390\/info11120547"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"e06016","DOI":"10.1016\/j.heliyon.2021.e06016","article-title":"Measuring the level of cyber-security awareness for cybercrime in Saudi Arabia","volume":"7","author":"Alzubaidi","year":"2021","journal-title":"Heliyon"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1496","DOI":"10.4236\/health.2021.1312107","article-title":"A critical review of healthcare human resource development: A Saudization perspective","volume":"13","author":"Alhazmi","year":"2021","journal-title":"Health"},{"key":"ref_7","unstructured":"IBM (2025, August 01). Cost of a Data Breach Report 2024\u2014Healthcare Industry. Available online: https:\/\/wp.table.media\/wp-content\/uploads\/2024\/07\/30132828\/Cost-of-a-Data-Breach-Report-2024.pdf."},{"key":"ref_8","unstructured":"Kaspersky Lab (2025, August 01). Phishing and Spam Annual Report 2024. Available online: https:\/\/www.kaspersky.co.za\/about\/press-releases\/kaspersky-reports-nearly-900-million-phishing-attempts-in-2024-as-cyber-threats-increase?utm_source=chatgpt.com."},{"key":"ref_9","unstructured":"Kaspersky Lab (2025, August 01). Dark Web Exposed Records\u2014Middle East Healthcare Sector. Available online: https:\/\/cybersecurityasia.net\/kaspersky-nearly-900-million-phishing-attempts\/?utm_source=chatgpt.com."},{"key":"ref_10","unstructured":"Kaspersky Digital Footprint Intelligence (2025, August 01). Whispers from the Dark Web: 9.7 Million Compromised Accounts from the Middle East Uncovered. Available online: https:\/\/dfi.kaspersky.com\/blog\/whispers-from-darkweb."},{"key":"ref_11","unstructured":"SOCRadar (2025, August 01). Saudi Arabia Threat Landscape Report. Available online: https:\/\/socradar.io\/wp-content\/uploads\/2024\/12\/SOCRadar-Saudi-Arabia-Threat-Landscape-Report-2024.pdf."},{"key":"ref_12","unstructured":"Proofpoint (2025, August 01). Voice of the CISO 2024: Defending Data in a Perimeterless World. Available online: https:\/\/www.proofpoint.com\/uk\/newsroom\/press-releases\/proofpoints-2024-voice-ciso-report-more-two-thirds-cisos-saudi-arabia-feel?utm_source=chatgpt.com."},{"key":"ref_13","unstructured":"(2025, August 01). IBM Report: Saudi Arabia Continues to Be Targeted by Cyber Threat Actors. Available online: https:\/\/www.zawya.com\/en\/press-release\/research-and-studies\/ibm-report-saudi-arabia-continues-to-be-targeted-by-cyber-threat-actors-t5m56ul5."},{"key":"ref_14","unstructured":"(2025, August 01). Threat Actors Continue to Target Saudi Arabia: IBM. Available online: https:\/\/securitymea.com\/2023\/03\/28\/threat-actors-continue-to-target-saudi-arabia-ibm\/."},{"key":"ref_15","unstructured":"(2025, August 01). Kaspersky Reports Phishing Attacks Grew by 40 Per Cent. Available online: https:\/\/www.kaspersky.com\/about\/press-releases\/2024_kaspersky-reports-phishing-attacks-grow-by-40-percent-in-2023."},{"key":"ref_16","first-page":"179","article-title":"Cyber Security Attacks and Challenges in Saudi Arabia during COVID-19","volume":"23","author":"Almrezeq","year":"2023","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"ref_17","unstructured":"Bada, M., Sasse, A.M., and Nurse, J.R. (2019). Cyber security awareness campaigns: Why do they fail to change behaviour?. arXiv."},{"key":"ref_18","unstructured":"(2025, August 01). Phishing Awareness Training for Healthcare Staff. Available online: https:\/\/www.securahealth.com\/phishing-awareness-training-healthcare-staff."},{"key":"ref_19","unstructured":"(2025, August 01). IBM Report: Average Cost per Data Breach Incident in the Middle East Stands at $6.53 Million. Available online: https:\/\/www.albawaba.com\/business\/pr\/2020-ibm-report-average-cost-data-breach-incident-middle-east-stands-653-million."},{"key":"ref_20","first-page":"40","article-title":"Cyber Security Challenges Faced by Employees in the Digital Workplace of Saudi Arabia\u2019s Digital Nature Organization","volume":"17","author":"Muthuswamy","year":"2023","journal-title":"Int. J. Cyber Criminol."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Yeng, P.K., Fauzi, M.A., Yang, B., and Nimbe, P. (2022). Investigation into phishing risk behaviour among healthcare staff. Information, 13.","DOI":"10.2196\/preprints.37393"},{"key":"ref_22","unstructured":"(2025, August 01). Healthcare Cyber Attack Statistics 2022: 25 Alarming Data Breaches You Should Know. Available online: https:\/\/expertinsights.com\/insights\/healthcare-cyber-attack-statistics."},{"key":"ref_23","unstructured":"(2025, August 01). The Healthcare Industry\u2019s Top Cybersecurity Risks. Available online: https:\/\/fieldeffect.com\/blog\/healthcare-industry-top-cyber-security-risks."},{"key":"ref_24","unstructured":"(2025, August 01). Report: Saudi Arabia, UAE Hospitals Put Citizens at Cyber Risks. Available online: https:\/\/www.edgemiddleeast.com\/security\/report-saudi-arabia-uae-hospitals-put-citizens-at-cyber-risks."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1007\/978-3-030-41568-6_15","article-title":"I do it because they do it: Social-neutralisation in information security practices of Saudi medical interns","volume":"Volume 14","author":"Altamimi","year":"2020","journal-title":"Proceedings of the Risks and Security of Internet and Systems: 14th International Conference, CRiSIS 2019"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.maturitas.2018.04.008","article-title":"Cybersecurity in healthcare: A narrative review of trends, threats and ways forward","volume":"113","author":"Coventry","year":"2018","journal-title":"Maturitas"},{"key":"ref_27","unstructured":"IBM Security (2025, August 01). Cost of a Data Breach Report 2023. Available online: https:\/\/d110erj175o600.cloudfront.net\/wp-content\/uploads\/2023\/07\/25111651\/Cost-of-a-Data-Breach-Report-2023.pdf."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Alyahya, A., and Weir, G.R. (2021, January 27\u201328). Understanding responses to phishing in Saudi Arabia via the theory of planned behaviour. Proceedings of the 2021 National Computing Colleges Conference (NCCC), Taif, Saudi Arabia.","DOI":"10.1109\/NCCC49330.2021.9428823"},{"key":"ref_29","unstructured":"(2025, August 01). Strategies to Protect Saudi Arabia Healthcare from Cyberattacks. Available online: https:\/\/www.aman.com.sa\/blog\/securing-saudi-arabia-healthcare-from-cyberattacks."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1007\/s44229-022-00016-9","article-title":"Patient confidentiality of electronic health records: A recent review of the Saudi literature","volume":"4","author":"Almaghrabi","year":"2022","journal-title":"Dr. Sulaiman Al Habib Med. J."},{"key":"ref_31","unstructured":"(2025, August 01). Saudi Arabia Strengthens Its Cybersecurity Posture. Available online: https:\/\/www.pwc.com\/m1\/en\/media-centre\/articles\/saudi-arabia-strengthens-its-cybersecurity-posture.html."},{"key":"ref_32","unstructured":"(2025, August 01). Phishing and Scams Hit the Roof in Saudi Arabia with 168% Increase in Number of Detections in Q2. Available online: https:\/\/www.zawya.com\/en\/press-release\/companies-news\/phishing-and-scams-hit-the-roof-in-saudi-arabia-with-168-increase-in-number-of-detections-in-q2-2022-f4gnk6wt."},{"key":"ref_33","unstructured":"(2025, August 01). IBM Report: Total Cost of a Data Breach for Businesses in the Middle East Reaches SAR 29.9 Million\u2014The Highest in 10 Years. Available online: https:\/\/mea.newsroom.ibm.com\/IBM-Report-Total-Cost-of-a-Data-Breach-for-Businesses-in-the-Middle-East#:~:text=The%202023%20IBM%20report%20highlights,breach%20reached%20SAR%2032.46%20million."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"1173","DOI":"10.15537\/smj.2017.12.20631","article-title":"The impact of health information technology on patient safety","volume":"38","author":"Alotaibi","year":"2017","journal-title":"Saudi Med. J."},{"key":"ref_35","unstructured":"(2025, August 01). HIMSS Healthcare Cybersecurity Survey 2022. Available online: https:\/\/www.himss.org\/sites\/hde\/files\/media\/file\/2023\/04\/03\/2022-himss-cybersecurity-survey.pdf."},{"key":"ref_36","unstructured":"HIPAA Journal (2025, August 01). How to Protect Healthcare Data from Phishing Attacks. 5 October. Available online: https:\/\/www.hipaajournal.com\/protect-healthcare-data-from-phishing\/."},{"key":"ref_37","unstructured":"(2025, August 01). Marketing & Communications: Strengthening Healthcare Cybersecurity in Saudi Arabia Digital Era. Available online: https:\/\/saudihealthcareconsulting.com\/insights\/articles\/protecting-patient-data-saudi-cybersecurity-measures."},{"key":"ref_38","unstructured":"Saudi Ministry of Health (2025, August 01). National e-Health Strategy: Saudi Arabia. Presentation to the International Telecommunication Union. Available online: https:\/\/www.itu.int\/ITU-D\/cyb\/events\/2012\/e-health\/Nat_eH_Dev\/Session%204\/KSA-MOH-Presentation-SaudiArabia%20FINAL.pdf."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Aljedaani, B., Ahmad, A., Zahedi, M., and Ali Babar, M. (2020, January 7\u20139). Security awareness of end-users of mobile health applications: An empirical study. Proceedings of the MobiQuitous 2020-17th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Darmstadt, Germany.","DOI":"10.1145\/3448891.3448952"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1049\/htl2.12008","article-title":"Ensuring data integrity of healthcare information in the era of digital health","volume":"8","author":"Zarour","year":"2021","journal-title":"Healthc. Technol. Lett."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"107","DOI":"10.9734\/jerr\/2024\/v26i21075","article-title":"Emerging Threats in Cyberspace: Implications for National Security Policy and Healthcare Sector","volume":"26","author":"Stephanie","year":"2024","journal-title":"J. Eng. Res. Rep."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"102592","DOI":"10.1016\/j.techsoc.2024.102592","article-title":"Exploring the impact of cybersecurity on using electronic health records and their performance among healthcare professionals: A multi-analytical SEM-ANN approach","volume":"77","author":"Ramayah","year":"2024","journal-title":"Technol. Soc."},{"key":"ref_43","first-page":"11","article-title":"Cyber security in the healthcare sector-Current threats","volume":"22","author":"Kotkova","year":"2022","journal-title":"Int. Multidiscip. Sci. GeoConf. SGEM"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s00521-021-06389-6","article-title":"A statistical approach to secure health care services from DDoS attacks during COVID-19 pandemic","volume":"36","author":"Zhou","year":"2024","journal-title":"Neural Comput. Appl."},{"key":"ref_45","first-page":"5","article-title":"Critical success factors for health transformation in the Kingdom of Saudi Arabia (KSA)","volume":"14","author":"Alanazi","year":"2023","journal-title":"Am. Acad. Sch. Res. J."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1080\/00223980.1975.9915803","article-title":"A protection motivation theory of fear appeals and attitude change","volume":"91","author":"Rogers","year":"1975","journal-title":"J. Psychol."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.cose.2011.10.007","article-title":"Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory","volume":"31","author":"Ifinedo","year":"2012","journal-title":"Comput. Secur."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1057\/ejis.2010.72","article-title":"The influence of the informal social learning environment on information privacy policy compliance efficacy and intention","volume":"20","author":"Warkentin","year":"2011","journal-title":"Eur. J. Inf. Syst."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"709","DOI":"10.2307\/258792","article-title":"An integrative model of organizational trust","volume":"20","author":"Mayer","year":"1995","journal-title":"Acad. Manag. Rev."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Freeman, R.E. (2010). Strategic Management: A Stakeholder Approach, Pitman.","DOI":"10.1017\/CBO9781139192675"},{"key":"ref_51","unstructured":"Giorgi, A. (2009). The Descriptive Phenomenological Method in Psychology: A Modified Husserlian Approach, Duquesne University Press."},{"key":"ref_52","unstructured":"Creswell, J.W., and Poth, C.N. (2016). Qualitative Inquiry and Research Design: Choosing Among Five Approaches, Sage publications."},{"key":"ref_53","first-page":"643","article-title":"Colaizzi\u2019s descriptive phenomenological method","volume":"28","author":"Morrow","year":"2015","journal-title":"Psychol."},{"key":"ref_54","unstructured":"Valle, R.S., and King, M. (1978). Existential-Phenomenological Alternatives for Psychology, Oxford U Press."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1177\/1525822X05279903","article-title":"How many interviews are enough? An experiment with data saturation and variability","volume":"18","author":"Guest","year":"2006","journal-title":"Field Methods"},{"key":"ref_56","first-page":"11","article-title":"The utilisation of e-health in the Kingdom of Saudi Arabia","volume":"6","author":"Noor","year":"2019","journal-title":"Int. Res. J. Eng. Technol."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1192\/bja.2023.49","article-title":"Email in healthcare: Pros, cons and efficient use","volume":"30","author":"Ginn","year":"2024","journal-title":"BJPsych Adv."},{"key":"ref_58","unstructured":"Sprout.ai\u2019s (2025, August 01). Guide on the Role of Attachments in Enhancing Communication. Available online: https:\/\/sprouts.ai\/blog\/to-attach-or-not-to-attach-including-files-in-cold-emails\/."},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Alabdan, R. (2020). Phishing attacks survey: Types, vectors, and technical approaches. Future Internet, 12.","DOI":"10.3390\/fi12100168"},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Atherton, H., Sawmynaden, P., Meyer, B., and Car, J. (2012). Email for the coordination of healthcare appointments and attendance reminders. Cochrane Database Syst. Rev.","DOI":"10.1002\/14651858.CD007981.pub2"},{"key":"ref_61","unstructured":"Empuls (2025, August 01). 10 Best Appreciation Email to Team for Better Morale. Available online: https:\/\/blog.empuls.io\/appreciation-email-to-team\/."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Hon, K.W. (2024). Technology and Security for Lawyers and Other Professionals, Edward Elgar Publishing.","DOI":"10.4337\/9781803923918"},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Angafor, G.N. (2025). Social media security: The impact of AI-generated Whatsapp scams on the protection and privacy of Whatsapp community groups. Comput. Sci. IT Res. J., 6.","DOI":"10.51594\/csitrj.v6i1.1793"},{"key":"ref_64","first-page":"CD015705","article-title":"Healthcare workers\u2019 informal uses of mobile phones and other mobile devices to support their work: A qualitative evidence synthesis","volume":"8","author":"Glenton","year":"2024","journal-title":"Cochrane Database Syst. Rev."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Alkhalil, Z., Hewage, C., Nawaf, L., and Khan, I. (2021). Phishing attacks: A recent comprehensive study and a new anatomy. Front. Comput. Sci., 3.","DOI":"10.3389\/fcomp.2021.563060"},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Beseny\u0151, J., and Kov\u00e1cs, A.M. (2024). The Importance of Security Awareness in the Healthcare Sector: Examination of Threat Vectors, Environmental Factors, and Opportunities for Mitigation. Handbook of Terrorist and Insurgent Groups, CRC Press.","DOI":"10.4324\/9780429426063-31"},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"924","DOI":"10.1055\/s-0041-1735527","article-title":"Information security awareness and behaviours of health care professionals at public health care facilities","volume":"12","author":"Alhuwail","year":"2021","journal-title":"Appl. Clin. Inform."},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1080\/14790718.2020.1777134","article-title":"Language barriers in multilingual Saudi hospitals: Causes, consequences, and solutions","volume":"19","author":"Alhamami","year":"2022","journal-title":"Int. J. Multiling."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"63","DOI":"10.46299\/j.isjel.20240301.07","article-title":"The crucial role of the English language in intercultural communication within global healthcare","volume":"3","author":"Schindler","year":"2024","journal-title":"Int. Sci. J. Educ. Linguist."},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1515\/multi-2014-0007","article-title":"\u2018And then we summarise in English for the others\u2019: The lived experience of the multilingual workplace","volume":"33","author":"Angouri","year":"2014","journal-title":"Multilingua"},{"key":"ref_71","unstructured":"Fuglestad, S., and Herje, M.V.A. (2023). The Influence of Work Life Balance on Employee Well-Being: The Mediating Roles of Job Satisfaction and Burnout\/Stress. [Doctoral Dissertation, University of Stavanger]."},{"key":"ref_72","first-page":"1054","article-title":"Work-Life Balance and Job Satisfaction in the Era of Saudi Arabia\u2019s New Lifestyle: A Study on Expatriate Retention","volume":"21","author":"Alomari","year":"2023","journal-title":"Rev. Econ. Financ."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"100361","DOI":"10.1016\/j.cosrev.2021.100361","article-title":"Cyber security training for critical infrastructure protection: A literature review","volume":"40","author":"Chowdhury","year":"2021","journal-title":"Comput. Sci. Rev."}],"container-title":["Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-431X\/14\/8\/324\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T18:25:21Z","timestamp":1760034321000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-431X\/14\/8\/324"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,12]]},"references-count":73,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2025,8]]}},"alternative-id":["computers14080324"],"URL":"https:\/\/doi.org\/10.3390\/computers14080324","relation":{},"ISSN":["2073-431X"],"issn-type":[{"value":"2073-431X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,12]]}}}