{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T22:46:56Z","timestamp":1776206816213,"version":"3.50.1"},"reference-count":64,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2023,4,25]],"date-time":"2023-04-25T00:00:00Z","timestamp":1682380800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Autonomous University of Ciudad Juarez"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Systems"],"abstract":"<jats:p>The large amount of information handled by organizations has increased their dependance on information technologies, which has made information security management a complex task. This is mainly because they cover areas such as physical and environmental security, organization structure, human resources and the technologies used. Information security frameworks can minimize the complexity through the different documents that contain guidelines, standards, and requirements to establish the procedures, policies, and processes for every organization. However, the selection of an appropriate framework is by itself a critical and important task, as the framework must adapt to the characteristics of an organization. In this paper, a general vision of the newest versions of the NIST CSF, ISO\/IEC 27001:2022, and MAGERIT frameworks is provided by comparing their characteristics in terms of their approaches to the identification, assessment, and treatment of risks. Furthermore, their key characteristics are analyzed and discussed, which should facilitate the consideration of any of these frameworks for the risk management of complex manufacturing organizations.<\/jats:p>","DOI":"10.3390\/systems11050218","type":"journal-article","created":{"date-parts":[[2023,4,25]],"date-time":"2023-04-25T01:37:01Z","timestamp":1682386621000},"page":"218","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":43,"title":["A Systematic Review of Risk Management Methodologies for Complex Organizations in Industry 4.0 and 5.0"],"prefix":"10.3390","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5398-7078","authenticated-orcid":false,"given":"Juan Vicente","family":"Barraza de la Paz","sequence":"first","affiliation":[{"name":"Department of Industrial Engineering and Manufacturing, Autonomous University of Ciudad Ju\u00e1rez, Ciudad Ju\u00e1rez 32310, Chihuahua, Mexico"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2951-2344","authenticated-orcid":false,"given":"Luis Alberto","family":"Rodr\u00edguez-Pic\u00f3n","sequence":"additional","affiliation":[{"name":"Department of Industrial Engineering and Manufacturing, Autonomous University of Ciudad Ju\u00e1rez, Ciudad Ju\u00e1rez 32310, Chihuahua, Mexico"}]},{"given":"V\u00edctor","family":"Morales-Rocha","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computing, Autonomous University of Ciudad Ju\u00e1rez, Ciudad Ju\u00e1rez 32310, Chihuahua, Mexico"}]},{"given":"Soledad Vianey","family":"Torres-Arg\u00fcelles","sequence":"additional","affiliation":[{"name":"Department of Industrial Engineering and Manufacturing, Autonomous University of Ciudad Ju\u00e1rez, Ciudad Ju\u00e1rez 32310, Chihuahua, Mexico"}]}],"member":"1968","published-online":{"date-parts":[[2023,4,25]]},"reference":[{"key":"ref_1","first-page":"23","article-title":"Industry 4.0 and environmental accounting: A new revolution?","volume":"1","author":"Burritt","year":"2016","journal-title":"Asian J. Sustain. Soc. Responsib."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"21582440221094608","DOI":"10.1177\/21582440221094608","article-title":"Role of Industry 5.0 in Leveraging the Business Performance: Investigating Impact of Shared-Economy on Firms\u2019 Performance with Intervening Role of i5.0 Technologies","volume":"12","author":"Waheed","year":"2022","journal-title":"SAGE Open"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1016\/j.procs.2022.12.206","article-title":"Industry 4.0 vs. Industry 5.0: Co-Existence, Transition, or a Hybrid","volume":"217","author":"Golovianko","year":"2023","journal-title":"Procedia Comput. Sci."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"74977","DOI":"10.1109\/ACCESS.2022.3191426","article-title":"Scheduling under Uncertainty for Industry 4.0 and 5.0","volume":"10","author":"Bakon","year":"2022","journal-title":"IEEE Access"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"4488","DOI":"10.1111\/poms.13859","article-title":"Impact of cybersecurity on operations and supply chain management: Emerging trends and future research directions","volume":"31","author":"Kumar","year":"2022","journal-title":"Prod. Oper. Manag."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"97052","DOI":"10.1109\/ACCESS.2019.2929296","article-title":"Data management in industry 4.0: State of the art and open challenges","volume":"7","author":"Raptis","year":"2019","journal-title":"IEEE Access"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"546","DOI":"10.1057\/s41303-017-0066-x","article-title":"Why security and privacy research lies at the centre of the information systems (IS) artefact: Proposing a bold research agenda","volume":"26","author":"Lowry","year":"2017","journal-title":"Eur. J. Inf. Syst."},{"key":"ref_8","first-page":"294","article-title":"Integrated Security Management System for Enterprises in Industry 4.0","volume":"43","author":"Dotsenko","year":"2019","journal-title":"Inf. Secur. Int. J."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1108\/TQM-09-2020-0202","article-title":"The ISO\/IEC 27001 information security management standard: Literature review and theory-based research agenda","volume":"33","author":"Culot","year":"2021","journal-title":"TQM J."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Agrawal, V. (2017, January 26\u201328). A Framework for the Information Classification in ISO 27005 Standard. Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2017 and 3rd IEEE International Conference of Scalable and Smart Cloud, SSC 2017, New York, NY, USA.","DOI":"10.1109\/CSCloud.2017.13"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1080\/23738871.2018.1520271","article-title":"Review of cybersecurity frameworks: Context and shared concepts","volume":"3","author":"Azmi","year":"2018","journal-title":"J. Cyber Policy"},{"key":"ref_12","unstructured":"Dawson, M. (2017). PQDT\u2014Glob, London Metropolitan University."},{"key":"ref_13","first-page":"em0089","article-title":"Implementation of ISO 27001 Standards as GDPR Compliance Facilitator","volume":"4","author":"Lopes","year":"2019","journal-title":"J. Inf. Syst. Eng. Manag."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1093\/itnow\/bwaa116","article-title":"What is the nist framework","volume":"62","author":"Cockcroft","year":"2020","journal-title":"ITNOW"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"34","DOI":"10.26423\/rctu.v6i1.429","article-title":"Plan de contingencia para los equipos y sistemas inform\u00e1ticos utilizando la metodolog\u00eda MAGERIT","volume":"6","author":"Duchimaza","year":"2019","journal-title":"Rev. Cient\u00edfica Tecnol\u00f3gica UPSE"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"16","DOI":"10.7546\/EngSci.LVIII.21.01.02","article-title":"Aspects of the Evolution from Risk Management to Enterprise Global Risk Management","volume":"LVIII","author":"Popchev","year":"2021","journal-title":"Eng. Sci."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"100365","DOI":"10.1016\/j.iot.2021.100365","article-title":"Machine learning approaches to IoT security: A systematic literature review[Formula presented]","volume":"14","author":"Ahmad","year":"2021","journal-title":"Internet Things"},{"key":"ref_18","first-page":"70","article-title":"Emerging Technologies and Cyber Risk: How do we secure the Internet of Things (IoT) environment?","volume":"21","author":"Chun","year":"2019","journal-title":"J. Appl. Bus. Econ."},{"key":"ref_19","unstructured":"Falivene, L., and Tucker, B. (2021). Unifying Cyber Risk: Cyber Risk Maturity Model v1 Cyber Risk Maturity Model Construction Process & Maturity Model Document, Universidad de Buenos Aires."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Tatiara, R., Fajar, A.N., Siregar, B., and Gunawan, W. (2018, January 28\u201330). Analysis of factors that inhibiting implementation of Information Security Management System (ISMS) based on ISO 27001. Proceedings of the Journal of Physics: Conference Series, Medan, Indonesia.","DOI":"10.1088\/1742-6596\/978\/1\/012039"},{"key":"ref_21","unstructured":"Lambrinoudakis, C., Gritzalis, S., Xenakis, C., Katsikas, S., Karyda, M., Tsochou, A., Papadatos, K., Rantos, K., Pavlosoglou, Y., and Gasparinatos, S. (2022). Compendium of Risk Management Frameworks with Potential Interoperability: Supplement to the Interoperable EU Risk Management Framework Report, European Union Agency for Cybersecurity (ENISA)."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1111\/1467-8551.00375","article-title":"Towards a Methodology for Developing Evidence-Informed Management Knowledge by Means of Systematic Review","volume":"14","author":"Tranfield","year":"2003","journal-title":"Br. J. Manag."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1177\/0739456X17723971","article-title":"Guidance on Conducting a Systematic Literature Review","volume":"39","author":"Xiao","year":"2019","journal-title":"J. Plan. Educ. Res."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1633","DOI":"10.1017\/dsi.2019.169","article-title":"Systematic literature reviews: An introduction","volume":"1","author":"Lame","year":"2019","journal-title":"Proc. Int. Conf. Eng. Des. ICED"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Ali, R.F., Dominic, P.D.D., Ali, S.E.A., Rehman, M., and Sohail, A. (2021). Information security behavior and information security policy compliance: A systematic literature review for identifying the transformation process from noncompliance to compliance. Appl. Sci., 11.","DOI":"10.3390\/app11083383"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/s40860-020-00115-0","article-title":"Cybersecurity management in cloud computing: Semantic literature review and conceptual framework proposal","volume":"7","author":"Tissir","year":"2021","journal-title":"J. Reliab. Intell. Environ."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Krumay, B., Bernroider, E.W.N., and Walser, R. (2018, January 28\u201330). Evaluation of Cybersecurity Management Controls and Metrics of Critical Infrastructures: A Literature Review Considering the NIST Cybersecurity Framework. Proceedings of the Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Olso, Norway.","DOI":"10.1007\/978-3-030-03638-6_23"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"85701","DOI":"10.1109\/ACCESS.2022.3197899","article-title":"A Survey on the Cyber Security of Small-to-Medium Businesses: Challenges, Research Focus and Recommendations","volume":"10","author":"Chidukwai","year":"2022","journal-title":"IEEE Access"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3145905","article-title":"Exiting the risk assessment maze: A meta-survey","volume":"51","author":"Gritzalis","year":"2018","journal-title":"ACM Comput. Surv."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Pappalardo, S.M., Niemiec, M., Bozhilova, M., Stoianov, N., Dziech, A., and Stiller, B. (2020, January 8\u20139). Multi-sector assessment framework\u2014A new approach to analyse cybersecurity challenges and opportunities. Proceedings of the Communications in Computer and Information Science, Krak\u00f3w, Poland.","DOI":"10.1007\/978-3-030-59000-0_1"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Santos-Olmo, A., S\u00e1nchez, L.E., \u00c1lvarez, E., Rosado, D.G., and Fernandez-Medina, E. (2020, January 22\u201324). Revisi\u00f3n Sistem\u00e1tica de An\u00e1lisis de Riesgos Asociativos y Jer\u00e1rquicos. Periodo 2014\u20132019. Proceedings of the Seguridad Inform\u00e1tica. X Congreso Iberoamericano(CIBSI 2020), Bogota, Colombia.","DOI":"10.12804\/si9789587844337.13"},{"key":"ref_32","unstructured":"Hurtado, M. (2018). Repos Inst Univ Pilot Colomb, Universidad Piloto de Colombia."},{"key":"ref_33","first-page":"1","article-title":"Methodologies, Requirements and Challenges of Cybersecurity Frameworks: A Review","volume":"13","author":"Khaleefah","year":"2023","journal-title":"Int. J. Wirel. Microw. Technol."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"31","DOI":"10.33555\/acmit.v7i1.105","article-title":"Analysis correlation of the Implementation Framework COBIT 5, ITIL V3 and ISO 27001 for ISO 10002 Customer satisfaction","volume":"7","author":"Bawono","year":"2021","journal-title":"ACMIT Proc."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Roy, P.P. (2020, January 7\u20138). A High-Level Comparison between the NIST Cyber Security Framework and the ISO 27001 Information Security Standard. Proceedings of the 2020 National Conference on Emerging Trends on Sustainable Technology and Engineering Applications (NCETSTEA), Durgapur, India.","DOI":"10.1109\/NCETSTEA48365.2020.9119914"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Garc\u00eda, F.Y.H., and Moreta, L.M.L. (2018, January 17\u201319). Maturity Model for the Risk Analysis of Information Assets based on Methodologies MAGERIT, OCTAVE y MEHARI; Focused on Shipping Companies. Proceedings of the Applications in Software Engineering\u2014Proceedings of the 7th International Conference on Software Process Improvement, CIMPS 2018, Guadalajara, Mexico.","DOI":"10.1109\/CIMPS.2018.8625848"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Yoseviano, H.F., and Retnowardhani, A. (2018, January 3\u20135). The use of ISO\/IEC 27001: 2009 to analyze the risk and security of information system assets: Case study in xyz, ltd. Proceedings of the 2018 International Conference on Information Management and Technology, ICIMTech 2018, Jakarta, Indonesia.","DOI":"10.1109\/ICIMTech.2018.8528096"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Carvalho, C., and Marques, E. (2019, January 19\u201322). Adapting ISO 27001 to a Public Institution. Proceedings of the Iberian Conference on Information Systems and Technologies, CISTI, Coimbra, Portugal.","DOI":"10.23919\/CISTI.2019.8760870"},{"key":"ref_39","first-page":"714","article-title":"Review of Cyber Security on Oil and Gas Industry in United Arab Emirates: Analysis on the Effectiveness of the National Institute of Standards and Technology\u2019s (NIST) Cybersecurity Framework","volume":"12","author":"ALDhanhani","year":"2021","journal-title":"Turk. J. Comput. Math. Educ."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"5171","DOI":"10.1007\/s11227-018-2479-2","article-title":"A security review of local government using NIST CSF: A case study","volume":"74","author":"Ibrahim","year":"2018","journal-title":"J. Supercomput."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Amiruddin, A., Afiansyah, H.G., and Nugroho, H.A. (2021, January 28\u201329). Cyber-Risk Management Planning Using NIST CSF v1.1, NIST SP 800-53 Rev. 5, and CIS Controls v8. Proceedings of the 3rd International Conference on Informatics, Multimedia, Cyber, and Information System, ICIMCIS 2021, Jakarta, Indonesia.","DOI":"10.1109\/ICIMCIS53775.2021.9699337"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Udroiu, A.M., Dumitrache, M., and Sandu, I. (July, January 30). Improving the cybersecurity of medical systems by applying the NIST framework. Proceedings of the 2022 14th International Conference on Electronics, Computers and Artificial Intelligence, ECAI 2022, Ploiesti, Romania.","DOI":"10.1109\/ECAI54874.2022.9847498"},{"key":"ref_43","first-page":"1","article-title":"Model for measuring the maturity of the risk analysis of information assets in the context of shipping companies","volume":"2019","author":"Moreta","year":"2019","journal-title":"RISTI\u2014Rev. Iber. Sist. E Tecnol. Inf."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"19","DOI":"10.47187\/perspectivas.5.1.179","article-title":"An\u00e1lisis de ciberseguridad en plataformas e-learning: Revisi\u00f3n sistem\u00e1tica de la literatura","volume":"5","year":"2023","journal-title":"Rev. Perspect."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Diamantopoulou, V., Tsohou, A., and Karyda, M. (2020, January 26\u201327). From ISO\/IEC 27002:2013 information security controls to personal data protection controls: Guidelines for GDPR compliance. Proceedings of the Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Luxembourg City, Luxembourg.","DOI":"10.1007\/978-3-030-42048-2_16"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1109\/TEM.2020.2977815","article-title":"Exploring the Adoption of the International Information Security Management System Standard ISO\/IEC 27001: A Web Mining-Based Analysis","volume":"68","author":"Mirtsch","year":"2021","journal-title":"IEEE Trans. Eng. Manag."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Putra, D.S.K., Tistiyani, S., and Sunaringtyas, S.U. (2021, January 27\u201328). The Use of ISO\/IEC 27001 Family of Standards in Regulatory Requirements in Some Countries. Proceedings of the 2021 2nd International Conference on ICT for Rural Development, IC-ICTRuDev 2021, Jogjakarta, Indonesia.","DOI":"10.1109\/IC-ICTRuDev50538.2021.9656529"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Longras, A., Pereira, T., Cameiro, P., and Pinto, P. (2018, January 25\u201327). On the Track of ISO\/IEC 27001:2013 Implementation Difficulties in Portuguese Organizations. Proceedings of the 9th International Conference on Intelligent Systems 2018: Theory, Research and Innovation in Applications, IS 2018\u2014Proceedings, Funchal, Portugal.","DOI":"10.1109\/IS.2018.8710558"},{"key":"ref_49","unstructured":"Yvon, T. (2020). Exploring Factors Limiting Implementation of the National Institute of Standards and Technology Cybersecurity Framework, Colorado Technical University."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Mylrea, M., Gourisetti, S.N.G., Larimer, C., and Noonan, C. (2018, January 24). Insider threat cybersecurity framework webtool & methodology: Defending against complex cyber-physical threats. Proceedings of the 2018 IEEE Symposium on Security and Privacy Workshops, SPW 2018, San Francisco, CA, USA.","DOI":"10.1109\/SPW.2018.00036"},{"key":"ref_51","unstructured":"National Institute of Standards and Technology [NIST] (2018). Risk Management Framework for Information Systems and Organizations, National Institute of Standards and Technology [NIST]. Special Publication 800-37 Rev. 2."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Malatji, M. (2023, January 26\u201327). Management of enterprise cyber security: A review of ISO\/IEC 27001:2022. Proceedings of the 2023 International Conference on Cyber Management and Engineering, CyMaEn 2023, Bangkok, Thailand.","DOI":"10.1109\/CyMaEn57228.2023.10051114"},{"key":"ref_53","unstructured":"Ortega, L., and Medina, L. (2020). Riesgos Tecnol\u00f3gicos en Peque\u00f1as Empresas. Una Revisi\u00f3n a sus Incidentes en la Gesti\u00f3n Organizacional, Fundaci\u00f3n Universitaria Panamericana."},{"key":"ref_54","unstructured":"Kurii, Y., and Opirskyy, I. (2022, January 13). Analysis and Comparison of the NIST SP 800-53 and ISO\/IEC 27001:2013. Proceedings of the CEUR Workshop Proceedings, Kyiv, Ukraine."},{"key":"ref_55","first-page":"225","article-title":"Comparative analysis and design of cybersecurity maturity assessment methodology using nist csf, cobit, iso\/iec 27002 and pci dss","volume":"4","author":"Sulistyowati","year":"2020","journal-title":"Int. J. Inform. Vis."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"894","DOI":"10.1016\/j.promfg.2020.01.400","article-title":"Critical Success Factors of Risk Management with the Advent of ISO 31000 2018\u2014Descriptive and Content Analyzes","volume":"39","author":"Takia","year":"2019","journal-title":"Procedia Manuf."},{"key":"ref_57","unstructured":"(2017). Risk Management\u2014Guidelines (Standard No. ISO 31000:2018)."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"10311","DOI":"10.1109\/ACCESS.2018.2800664","article-title":"An improved information security risk assessments method for cyber-physical-social computing and networking","volume":"6","author":"Li","year":"2018","journal-title":"IEEE Access"},{"key":"ref_59","unstructured":"(2022). Information Security, Cybersecurity and Privacy Protection\u2014Guidance on Managing Information Security Risks (Standard No. ISO\/IEC 27005:2022)."},{"key":"ref_60","unstructured":"National Institute of Standards and Technology [NIST] (2012). Guide for Conducting Risk Assessments, National Institute of Standards and Technology [NIST]. Special Publication 800-30 Rev. 1."},{"key":"ref_61","unstructured":"National Institute of Standards and Technology [NIST] (2011). Managing Information Security Risk Organization, Mission, and Information System View, National Institute of Standards and Technology [NIST]. Special Publication 800-39."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"107","DOI":"10.29019\/enfoqueute.v8n1.140","article-title":"Ecu@Risk, Una metodolog\u00eda para la gesti\u00f3n de Riesgos aplicada a las MPYMEs","volume":"8","year":"2017","journal-title":"Enfoque UTE"},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Hariyanti, E., Djunaidy, A., and Siahaan, D.O. (2018, January 7\u20138). A Conceptual Model for Information Security Risk Considering Business Process Perspective. Proceedings of the 2018 4th International Conference on Science and Technology, ICST 2018, Yogyakarta, Indonesia.","DOI":"10.1109\/ICSTC.2018.8528678"},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Canel\u00f3n, J., Huerta, E., Leal, N., and Ryan, T. (2020, January 7\u201310). Unstructured data for cybersecurity and internal control. Proceedings of the Annual Hawaii International Conference on System Sciences, Maui, HI, USA.","DOI":"10.24251\/HICSS.2020.665"}],"container-title":["Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2079-8954\/11\/5\/218\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T19:22:48Z","timestamp":1760124168000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2079-8954\/11\/5\/218"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,25]]},"references-count":64,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2023,5]]}},"alternative-id":["systems11050218"],"URL":"https:\/\/doi.org\/10.3390\/systems11050218","relation":{},"ISSN":["2079-8954"],"issn-type":[{"value":"2079-8954","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,25]]}}}