{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T23:18:28Z","timestamp":1763767108438,"version":"build-2065373602"},"reference-count":66,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The purpose of this paper is to propose a framework for cybersecurity risk management in telemedicine. The framework, which uses a bow-tie approach for medical image diagnosis sharing, allows the identification, analysis, and assessment of risks, considering the ISO\/TS 13131:2014 recommendations. The bow-tie method combines fault tree analysis (FTA) and event tree analysis (ETA). The literature review supported the identification of the main causes and forms of control associated with cybersecurity risks in telemedicine. The main finding of this paper is that it is possible, through a structured model, to manage risks and avoid losses for everyone involved in the process of exchanging medical image information through telemedicine services. Through the framework, those responsible for the telemedicine services can identify potential risks in cybersecurity and act preventively, recognizing the causes even as, in a mitigating way, identifying viable controls and prioritizing investments. Despite the existence of many studies on cybersecurity, the paper provides theoretical contributions to studies on cybersecurity risks and features a new methodological approach, which incorporates both causes and consequences of the incident scenario.<\/jats:p>","DOI":"10.3390\/s21072426","type":"journal-article","created":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T10:44:01Z","timestamp":1617273841000},"page":"2426","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A Risk Assessment Framework Proposal Based on Bow-Tie Analysis for Medical Image Diagnosis Sharing within Telemedicine"],"prefix":"10.3390","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7100-2319","authenticated-orcid":false,"given":"Thiago","family":"Poleto","sequence":"first","affiliation":[{"name":"Department of Business Administration, Federal University of Par\u00e1, Bel\u00e9m 66075-110, Brazil"}]},{"given":"Maisa Mendon\u00e7a","family":"Silva","sequence":"additional","affiliation":[{"name":"Department of Management Engineering, Universidade Federal de Pernambuco, Recife 50670-901, Brazil"}]},{"given":"Th\u00e1rcylla Rebecca Negreiros","family":"Clemente","sequence":"additional","affiliation":[{"name":"Department of Management Engineering CAA, Universidade Federal de Pernambuco, Caruaru 55002-970, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8353-2499","authenticated-orcid":false,"given":"Ana Paula Henriques","family":"de Gusm\u00e3o","sequence":"additional","affiliation":[{"name":"Department of Management Engineering, Universidade Federal de Sergipe, S\u00e3o Crist\u00f3v\u00e3o 49100-000, Brazil"}]},{"given":"Ana Paula de Barros","family":"Ara\u00fajo","sequence":"additional","affiliation":[{"name":"Department of Management Engineering, Universidade Federal de Pernambuco, Recife 50670-901, Brazil"}]},{"given":"Ana Paula Cabral Seixas","family":"Costa","sequence":"additional","affiliation":[{"name":"Department of Management Engineering, Universidade Federal de Pernambuco, Recife 50670-901, Brazil"}]}],"member":"1968","published-online":{"date-parts":[[2021,4,1]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/j.acap.2017.08.008","article-title":"Children with Medical Complexity: A Web-Based Multimedia Curriculum Assessing Pediatric Residents Across North America","volume":"18","author":"Shah","year":"2018","journal-title":"Acad. Pediatr."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1177\/0885066611429539","article-title":"Internet-Based Learning and Applications for Critical Care Medicine","volume":"27","author":"Wolbrink","year":"2012","journal-title":"J. Intensive Care Med."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.neucom.2016.08.097","article-title":"Editorial: Recent research in medical technology based on multimedia and pattern recognition","volume":"220","author":"Lv","year":"2017","journal-title":"Neurocomputing"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1016\/j.neucom.2016.08.041","article-title":"Ben Recognition of Alzheimer\u2019s disease and Mild Cognitive Impairment with multimodal image-derived biomarkers and Multiple Kernel Learning","volume":"220","author":"Ahmed","year":"2017","journal-title":"Neurocomputing"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1016\/j.neucom.2016.05.101","article-title":"Class-wise dictionary learning for hyperspectral image classification","volume":"220","author":"Hao","year":"2017","journal-title":"Neurocomputing"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Wisniewski, R., Grobelna, I., and Karatkevich, A. (2020). Determinism in Cyber-Physical Systems Specified by Interpreted Petri Nets. Sensors, 20.","DOI":"10.3390\/s20195565"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"490","DOI":"10.1016\/j.dss.2012.03.008","article-title":"A two-stage analysis of the influences of employee alignment on effecting business-IT alignment","volume":"53","author":"Wong","year":"2012","journal-title":"Decis. Support Syst."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1016\/j.compmedimag.2007.02.002","article-title":"Computer-aided diagnosis in medical imaging: Historical review, current status and future potential","volume":"31","author":"Doi","year":"2007","journal-title":"Comput. Med. Imaging Graph."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1016\/0720-048X(96)00768-1","article-title":"Picture archiving and communication system (PACS): A progressive approach with small systems","volume":"22","author":"Osteaux","year":"1996","journal-title":"Eur. J. Radiol."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1016\/S0976-0016(11)60102-6","article-title":"Picture Archiving and Communication Systems (PACS)\u2014A New Paradigm in Healthcare","volume":"7","author":"Kapoor","year":"2010","journal-title":"Apollo Med."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1177\/1477750915591293","article-title":"The decline of medical confidentiality medical information management: The illusion of patient choice","volume":"10","author":"Whiteman","year":"2015","journal-title":"Clin. Ethics"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"101701","DOI":"10.1016\/j.cose.2019.101701","article-title":"Privacy-preserving self-serviced medical diagnosis scheme based on secure multi-party computation","volume":"90","author":"Li","year":"2020","journal-title":"Comput. Secur."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"48946","DOI":"10.1109\/ACCESS.2018.2866971","article-title":"A Privacy-Preserving Online Medical Prediagnosis Scheme for Cloud Environment","volume":"6","author":"Guo","year":"2018","journal-title":"IEEE Access"},{"key":"ref_14","first-page":"91","article-title":"Selective medical image encryption using DNA cryptography","volume":"29","author":"Akkasaligar","year":"2020","journal-title":"Inf. Secur. J."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1016\/j.ins.2020.02.012","article-title":"The fast image encryption algorithm based on lifting scheme and chaos","volume":"520","author":"Zhang","year":"2020","journal-title":"Inf. Sci."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1016\/j.comcom.2020.01.038","article-title":"An improved DWT-SVD domain watermarking for medical information security","volume":"152","author":"Anand","year":"2020","journal-title":"Comput. Commun."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Diaz, A., and Sanchez, P. (2016). Simulation of Attacks for Security in Wireless Sensor Network. Sensors, 16.","DOI":"10.3390\/s16111932"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/j.cose.2008.11.003","article-title":"How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management","volume":"28","author":"Liginlal","year":"2009","journal-title":"Comput. Secur."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1016\/j.ijinfomgt.2018.08.008","article-title":"Cybersecurity risk analysis model using fault tree analysis and fuzzy decision theory","volume":"43","author":"Poleto","year":"2018","journal-title":"Int. J. Inf. Manag."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1016\/j.chb.2016.12.040","article-title":"Gender difference and employees\u2019 cybersecurity behaviors","volume":"69","author":"Anwar","year":"2017","journal-title":"Comput. Hum. Behav."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"2236","DOI":"10.1109\/TII.2016.2599841","article-title":"A Cybersecurity Detection Framework for Supervisory Control and Data Acquisition Systems","volume":"12","author":"Cruz","year":"2016","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1049\/iet-cps.2017.0013","article-title":"Detection of false data injection attacks against state estimation in smart grids based on a mixture Gaussian distribution learning method","volume":"2","author":"Foroutan","year":"2017","journal-title":"IET Cyber-Phys. Syst. Theory Appl."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1283","DOI":"10.1111\/j.1539-6924.2007.00957.x","article-title":"A framework for linking cybersecurity metrics to the modeling of macroeconomic interdependencies","volume":"27","author":"Santos","year":"2007","journal-title":"Risk Anal."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"635","DOI":"10.1007\/s11023-019-09508-4","article-title":"Ethics of AI and Cybersecurity When Sovereignty is at Stake","volume":"29","author":"Timmers","year":"2019","journal-title":"Minds Mach."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"3040","DOI":"10.1109\/TPWRS.2015.2482364","article-title":"Cyber-Based Contingency Analysis","volume":"31","author":"Ten","year":"2016","journal-title":"IEEE Trans. Power Syst."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/s13198-013-0145-x","article-title":"Fuzzy fault tree analysis: A review of concept and application","volume":"4","author":"Mahmood","year":"2013","journal-title":"Int. J. Syst. Assur. Eng. Manag."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Poleto, T., de Oliveira, R.C.P., da Silva, A.L.B., and de Carvalho, V.D.H. (2020). Using Fuzzy Cognitive Map Approach for Assessing Cybersecurity for Telehealth Scenario. World Conference on Information Systems and Technologies, Springer.","DOI":"10.1007\/978-3-030-45691-7_78"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/s10729-018-9460-8","article-title":"Approaches for identifying U.S. medicare fraud in provider claims data","volume":"23","author":"Herland","year":"2020","journal-title":"Health Care Manag. Sci."},{"key":"ref_29","unstructured":"Mechanic, O.J., and Kimball, A.B. (2019). Telehealth Systems, StatPearls."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1585","DOI":"10.1056\/NEJMsr1503323","article-title":"Telehealth","volume":"377","author":"Tuckson","year":"2017","journal-title":"N. Engl. J. Med."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"39","DOI":"10.5195\/ijt.2017.6231","article-title":"A Systematic Review of Research Studies Examining Telehealth Privacy and Security Practices Used By Healthcare Providers","volume":"9","author":"Watzlaf","year":"2017","journal-title":"Int. J. Telerehabilit."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Ristevski, B., and Chen, M. (2018). Big Data Analytics in Medicine and Healthcare. J. Integr. Bioinform., 15.","DOI":"10.1515\/jib-2017-0030"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.cose.2018.01.015","article-title":"Cybersecurity education: Evolution of the discipline and analysis of master programs","volume":"75","author":"Cabaj","year":"2018","journal-title":"Comput. Secur."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Enamamu, T., Otebolaku, A., Marchang, J., and Dany, J. (2020). Continuous m-Health Data Authentication Using Wavelet Decomposition for Feature Extraction. Sensors, 20.","DOI":"10.3390\/s20195690"},{"key":"ref_35","unstructured":"Zain, J., and Clarke, M. (2005, January 27\u201331). Security in telemedine: Issues in watermarking medical images. Proceedings of the 3rd International Conference: Sciences of Electronic, Technologies of Information and Telecommunications, Susa, Tunisia."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"733","DOI":"10.1016\/j.ijinfomgt.2014.07.005","article-title":"A multidimensional approach to information security risk management using FMEA and fuzzy theory","volume":"34","author":"Silva","year":"2014","journal-title":"Int. J. Inf. Manag."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"De Gusm\u00e3o, A.P.H., E Silva, L.C., Silva, M.M., Poleto, T., and Costa, A.P.C.S. (2016). Information security risk analysis model using fuzzy decision theory. Int. J. Inf. Manag., 36.","DOI":"10.1016\/j.ijinfomgt.2015.09.003"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1016\/j.measurement.2019.02.069","article-title":"SVD-based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images","volume":"139","author":"Arunkumar","year":"2019","journal-title":"Measurement"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"46","DOI":"10.5815\/ijmecs.2016.04.06","article-title":"An Enhanced Digital Image Watermarking Scheme for Medical Images using Neural Network, DWT and RSA","volume":"8","author":"Nagpal","year":"2016","journal-title":"Int. J. Mod. Educ. Comput. Sci."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/j.cmpb.2018.02.021","article-title":"Encryption and watermark-treated medical image against hacking disease\u2014An immune convention in spatial and frequency domains","volume":"159","author":"Lakshmi","year":"2018","journal-title":"Comput. Methods Programs Biomed."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"107280","DOI":"10.1016\/j.sigpro.2019.107280","article-title":"A novel image encryption system merging fractional-order edge detection and generalized chaotic maps","volume":"167","author":"Ismail","year":"2020","journal-title":"Signal. Process."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/j.optlaseng.2019.05.027","article-title":"Color pathological image encryption algorithm using arithmetic over Galois field and coupled hyper chaotic system","volume":"122","author":"Liu","year":"2019","journal-title":"Opt. Lasers Eng."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.bspc.2016.05.005","article-title":"A new approach to fully-reversible watermarking in medical imaging with breakthrough visibility parameters","volume":"29","year":"2016","journal-title":"Biomed. Signal. Process. Control"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"106026","DOI":"10.1016\/j.optlaseng.2020.106026","article-title":"Generalized optical encryption framework based on Shearlets for medical image","volume":"128","author":"Chen","year":"2020","journal-title":"Opt. Lasers Eng."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"627","DOI":"10.1016\/j.future.2018.11.056","article-title":"Medical image classification algorithm based on principal component feature dimensionality reduction","volume":"98","author":"MingRu","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1016\/j.procs.2018.01.136","article-title":"Security Enhancement in Healthcare Cloud using Machine Learning","volume":"127","author":"Marwan","year":"2018","journal-title":"Procedia Comput. Sci."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"100123","DOI":"10.1016\/j.iot.2019.100123","article-title":"IoMT-SAF: Internet of Medical Things Security Assessment Framework","volume":"8","author":"Alsubaei","year":"2019","journal-title":"Int. Things"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1016\/j.jormas.2019.06.002","article-title":"Deep learning in medical image analysis: A third eye for doctors","volume":"120","author":"Fourcade","year":"2019","journal-title":"J. Stomatol. Oral Maxillofac. Surg."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/j.ijleo.2019.04.074","article-title":"A new digital image tamper detection algorithm based on integer wavelet transform and secured by encrypted authentication sequence with 3D quantum map","volume":"187","author":"Ayubi","year":"2019","journal-title":"Optik"},{"key":"ref_50","unstructured":"Shen, M., Cheng, G., Zhu, L., Du, X., and Hu, J. (2018). Content-based multi-source encrypted image retrieval in clouds with privacy preservation. Futur. Gener. Comput. Syst."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Thanki, R., and Borra, S. (2019). Medical Imaging and its Security in Telemedicine Applications, Springer International Publishing. SpringerBriefs in Applied Sciences and Technology.","DOI":"10.1007\/978-3-319-93311-5"},{"key":"ref_52","unstructured":"ISO (2014). ISO\/TS 13131 Health Informatics\u2014Telehealth Services\u2014Quality Planning Guidelines 2014, ISO."},{"key":"ref_53","first-page":"137","article-title":"Improving the Security of the Medical Images","volume":"4","author":"Mahmood","year":"2013","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1016\/j.jlp.2011.12.007","article-title":"Risk analysis for oil & gas pipelines: A sustainability assessment approach using fuzzy based bow-tie analysis","volume":"25","author":"Shahriar","year":"2012","journal-title":"J. Loss Prev. Process Ind."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1016\/j.ins.2014.05.034","article-title":"Obtain confidentiality or\/and authenticity in Big Data by ID-based generalized signcryption","volume":"318","author":"Wei","year":"2015","journal-title":"Inf. Sci."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"973","DOI":"10.1016\/j.ssci.2009.08.008","article-title":"A semi-quantitative assessment of occupational risks using bow-tie representation","volume":"48","author":"Jacinto","year":"2010","journal-title":"Saf. Sci."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1016\/j.jlp.2015.05.003","article-title":"Development of generic bow-tie diagrams of accidental scenarios triggered by flooding of industrial facilities (Natech)","volume":"36","author":"Piatyszek","year":"2015","journal-title":"J. Loss Prev. Process Ind."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/j.jlp.2014.01.006","article-title":"Integrating lean principles and fuzzy bow-tie analysis for risk assessment in chemical industry","volume":"29","author":"Aqlan","year":"2014","journal-title":"J. Loss Prev. Process Ind."},{"key":"ref_59","first-page":"211","article-title":"The bowtie method: A review","volume":"88","author":"Guldenmund","year":"2015","journal-title":"Saf. Sci."},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Ahmed, Y., Naqvi, S., and Josephs, M. (2019, January 8\u201310). Cybersecurity Metrics for Enhanced Protection of Healthcare IT Systems. Proceedings of the 2019 13th International Symposium on Medical Information and Communication Technology (ISMICT), Oslo, Norway.","DOI":"10.1109\/ISMICT.2019.8744003"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"1643","DOI":"10.1109\/TSG.2013.2294473","article-title":"Integrated anomaly detection for cyber security of the substations","volume":"5","author":"Hong","year":"2014","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1109\/MIS.2018.111145022","article-title":"Identifying SCADA systems and their vulnerabilities on the internet of things: A text-mining approach","volume":"33","author":"Samtani","year":"2018","journal-title":"IEEE Intell. Syst."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"853","DOI":"10.1109\/TSMCA.2010.2048028","article-title":"Cybersecurity for critical infrastructures: Attack and defense modeling","volume":"40","author":"Ten","year":"2010","journal-title":"IEEE Trans. Syst. Man Cybern. Part ASyst. Hum."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1109\/TSMC.2019.2903785","article-title":"Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques","volume":"50","author":"Khari","year":"2020","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"15747","DOI":"10.1109\/ACCESS.2020.2966656","article-title":"SMSH: Secure Surveillance Mechanism on Smart Healthcare IoT System with Probabilistic Image Encryption","volume":"8","author":"Khan","year":"2020","journal-title":"IEEE Access"},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"802","DOI":"10.2174\/1573405615666190408115158","article-title":"Privacy Protection of Patient Medical Images using Digital Watermarking Technique for E-healthcare System","volume":"15","author":"Sivaprakash","year":"2019","journal-title":"Curr. Med. Imaging Former. Curr. Med. Imaging Rev."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/7\/2426\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T13:33:23Z","timestamp":1760362403000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/7\/2426"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,1]]},"references-count":66,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2021,4]]}},"alternative-id":["s21072426"],"URL":"https:\/\/doi.org\/10.3390\/s21072426","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2021,4,1]]}}}