{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T16:26:34Z","timestamp":1764433594548,"version":"build-2065373602"},"reference-count":156,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Systems"],"abstract":"<jats:p>This study examines the evolving use of social software to combat online disinformation by investigating Weibo users\u2019 attitudes toward IP location disclosure as a measure of transparency and trustworthiness. We analyzed 49,579 posts (April 2022 to May 2023) from Weibo users about IP location disclosure, categorized the topics using LDA topic modeling within the frameworks of communication privacy management, the networked public sphere, and digital democracy, and conducted sentiment analysis. We constructed separate semantic networks for positive and negative terms to examine co-occurrence patterns. The results show that Weibo users are generally negative about this policy, as IP location may reveal personally identifiable information about individuals involved in discussions of online social\/political events. Mandatory transparency, while intended to enhance accountability, functions as a mandatory visibility regime that reshapes privacy boundaries and undermines inclusive deliberation. The findings contribute to the exploration of the impact of government-mandatory information privacy disclosure policies on the implementation of platform functionality, as well as changes in user sentiment, information behavior, and components of social media discourse.<\/jats:p>","DOI":"10.3390\/systems13110975","type":"journal-article","created":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T19:30:27Z","timestamp":1762198227000},"page":"975","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Digital Exposure and Emotional Response: Public Discourse on Mandatory IP Location Disclosure in Chinese Social Media"],"prefix":"10.3390","volume":"13","author":[{"given":"Yuehan","family":"Lu","sequence":"first","affiliation":[{"name":"Faculty of Education, The University of Hong Kong, Pokfulam, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7679-5183","authenticated-orcid":false,"given":"Zerong","family":"Xie","sequence":"additional","affiliation":[{"name":"Faculty of Education, The University of Hong Kong, Pokfulam, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7926-9568","authenticated-orcid":false,"given":"Dickson K. W.","family":"Chiu","sequence":"additional","affiliation":[{"name":"Faculty of Education, The University of Hong Kong, Pokfulam, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9565-2375","authenticated-orcid":false,"given":"Eleanna","family":"Kafeza","sequence":"additional","affiliation":[{"name":"Faculty of Business and Information Technology, Ontario Tech University, Oshawa, ON L1G 0C5, Canada"}]}],"member":"1968","published-online":{"date-parts":[[2025,11,1]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"206","DOI":"10.32996\/jbms.2024.6.1.13","article-title":"Blockchain applications in retail cybersecurity: Enhancing supply chain integrity, secure transactions, and data protection","volume":"6","author":"Ray","year":"2024","journal-title":"J. Bus. Manag. Stud."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Seneviratne, O., and Kagal, L. (2014, January 23\u201324). Enabling privacy through transparency. Proceedings of the 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada.","DOI":"10.1109\/PST.2014.6890931"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"467","DOI":"10.1108\/EMJB-11-2021-0181","article-title":"Antecedents of privacy concerns and online information disclosure: Moderating role of government regulation","volume":"18","author":"Chaudhuri","year":"2023","journal-title":"EuroMed J. Bus."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1177\/0743915619870480","article-title":"Panic attack: How illegitimate invasions of privacy cause consumer anxiety and dissatisfaction","volume":"39","author":"Stevens","year":"2020","journal-title":"J. Public Policy Mark."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1097","DOI":"10.1108\/JEIM-03-2020-0088","article-title":"Why people need privacy? The role of privacy fatigue in app users\u2019 intention to disclose privacy: Based on personality traits","volume":"34","author":"Tang","year":"2021","journal-title":"J. Enterp. Inf. Manag."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1005","DOI":"10.1287\/mnsc.2018.3269","article-title":"An experiment in hiring discrimination via online social networks","volume":"66","author":"Acquisti","year":"2020","journal-title":"Manag. Sci."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1111\/jbfa.12375","article-title":"Does location matter for disclosure? Evidence from geographic segments","volume":"46","author":"Leung","year":"2019","journal-title":"J. Bus. Financ. Account."},{"key":"ref_8","first-page":"113","article-title":"Ethical review of compulsory display of user IP addresses on multiple network platforms","volume":"7","author":"Zhang","year":"2024","journal-title":"J. Soc. Sci. Humanit. Lit."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"2171","DOI":"10.1080\/1369118X.2023.2289978","article-title":"Self-censorship among online harassment targets: The role of support at work, harassment characteristics, and the target\u2019s public visibility","volume":"27","author":"Celuch","year":"2024","journal-title":"Inf. Commun. Soc."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"102253","DOI":"10.1016\/j.tele.2025.102253","article-title":"Am I watching or being watched? Exploring the selective disclosure paradox in users\u2019 self-censorship to dataveillance awareness in video recommender systems","volume":"98","author":"Kim","year":"2025","journal-title":"Telemat. Inform."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1108\/JICES-07-2018-0060","article-title":"Self-censorship in social networking sites (SNSs)\u2014Privacy concerns, privacy awareness, perceived vulnerability and information management","volume":"17","author":"Warner","year":"2019","journal-title":"J. Inf. Commun. Ethics Soc."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"974","DOI":"10.1108\/IntR-07-2016-0204","article-title":"Does the Great Firewall cause self-censorship? The effects of perceived internet regulation and the justification of regulation","volume":"27","author":"Zhong","year":"2017","journal-title":"Internet Res."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1177\/0165551519879702","article-title":"Digital identity and the online self: Footprint strategies\u2014An exploratory and comparative research study","volume":"47","author":"Feher","year":"2021","journal-title":"J. Inf. Sci."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"2172","DOI":"10.1108\/INTR-03-2022-0142","article-title":"The dark side of digitalization and social media platform governance: A citizen engagement study","volume":"33","author":"McCarthy","year":"2023","journal-title":"Internet Res."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.61100\/tacit.v1i1.33","article-title":"The Impact of Social Media Use on Social Interaction in Contemporary Society","volume":"1","author":"Azzaakiyyah","year":"2023","journal-title":"Technol. Soc. Perspect."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1080\/01972243.2016.1153010","article-title":"Big data privacy: The datafication of personal information","volume":"32","author":"Mai","year":"2016","journal-title":"Inf. Soc."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"e21978","DOI":"10.2196\/21978","article-title":"Public perception of the COVID-19 pandemic on Twitter: Sentiment analysis and topic modeling study","volume":"6","author":"Skunkan","year":"2020","journal-title":"JMIR Public Health Surveill."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"101686","DOI":"10.1016\/j.giq.2022.101686","article-title":"The role of emotions for citizen engagement via social media\u2014A study of police departments using Twitter","volume":"39","author":"Leppert","year":"2022","journal-title":"Gov. Inf. Q."},{"key":"ref_19","unstructured":"China Internet Network Information Center (2023, March 13). The 51st Statistical Report on China\u2019s Internet Development. Available online: https:\/\/cnnic.cn\/NMediaFile\/2023\/0322\/MAIN16794576367190GBA2HA1KQ.pdf."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1080\/24701475.2020.1769894","article-title":"Tracing Weibo (2009\u20132019): The commercial dissolution of public communication and changing politics","volume":"4","author":"Jia","year":"2020","journal-title":"Internet Hist."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"e39805","DOI":"10.2196\/39805","article-title":"Public discourse and sentiment toward dementia on Chinese Social Media: Machine learning analysis of Weibo Posts","volume":"24","author":"Kong","year":"2022","journal-title":"J. Med. Internet Res."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"101806","DOI":"10.1016\/j.giq.2023.101806","article-title":"Government-led and internet-empowered citizen participation in China\u2019s policymaking: A case study of the Shanghai 2035 Master Plan","volume":"40","author":"Qiu","year":"2023","journal-title":"Gov. Inf. Q."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1177\/00323292211013181","article-title":"Delegated censorship: The dynamic, layered, and multistage information control regime in China","volume":"50","author":"Sun","year":"2022","journal-title":"Politics Soc."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1080\/01972243.2017.1294127","article-title":"Am I my IP address\u2019s keeper? Revisiting the boundaries of information privacy","volume":"33","year":"2017","journal-title":"Inf. Soc."},{"key":"ref_25","first-page":"1600","article-title":"Comparing public support for digital surveillance policies in 50 countries","volume":"105","author":"Jin","year":"2024","journal-title":"Soc. Sci. Q."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/s13278-023-01138-0","article-title":"Who joins which network, and why?","volume":"13","author":"Zhang","year":"2023","journal-title":"Soc. Netw. Anal. Min."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"102978","DOI":"10.1016\/j.telpol.2025.102978","article-title":"Uncovering the impact of IP location display on user behavior in China\u2019s social platforms: A policy-driven analysis","volume":"49","author":"Li","year":"2025","journal-title":"Telecommun. Policy"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"102759","DOI":"10.1016\/j.telpol.2024.102759","article-title":"Does displaying one\u2019s IP location influence users\u2019 privacy behavior on social media? Evidence from China\u2019s Weibo","volume":"48","author":"Liu","year":"2024","journal-title":"Telecommun. Policy"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"zmae018","DOI":"10.1093\/jcmc\/zmae018","article-title":"Topic territoriality and the cost of civility: Examining the impact of IP address disclosure on Weibo","volume":"29","author":"Yu","year":"2024","journal-title":"J. Comput. Mediat. Commun."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1016\/j.chb.2017.01.016","article-title":"\u201cWe were not prepared to tell people yet\u201d: Confidentiality breaches and boundary turbulence on Facebook","volume":"70","author":"DeGroot","year":"2017","journal-title":"Comput. Hum. Behav."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1016\/j.copsyc.2019.08.009","article-title":"Conceptualization and operationalization: Utility of communication privacy management theory","volume":"31","author":"Petronio","year":"2020","journal-title":"Curr. Opin. Psychol."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1177\/0893318917692896","article-title":"To reveal or conceal: Using communication privacy management theory to understand disclosures in the workplace","volume":"31","author":"Smith","year":"2017","journal-title":"Manag. Commun. Q."},{"key":"ref_33","unstructured":"Habermas, J. (1991). The Structural Transformation of the Public Sphere: An Inquiry into a Category of Bourgeois Society, MIT Press."},{"key":"ref_34","unstructured":"Benkler, Y. (2006). The Wealth of Networks: How Social Production Transforms Markets and Freedom, Yale University Press."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1016\/j.giq.2010.03.001","article-title":"Using ICTs to create a culture of transparency: E-government and social media as openness and anti-corruption tools for societies","volume":"27","author":"Bertot","year":"2010","journal-title":"Gov. Inf. Q."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1177\/14614440222226244","article-title":"The virtual sphere: The internet as a public sphere","volume":"4","author":"Papacharissi","year":"2002","journal-title":"New Media Soc."},{"key":"ref_37","first-page":"1505","article-title":"The discursive construction of journalistic transparency","volume":"18","author":"Vos","year":"2017","journal-title":"J. Stud."},{"key":"ref_38","first-page":"1653","article-title":"Not so distinct after all: Assessing social stratification of news users on the web","volume":"20","year":"2019","journal-title":"J. Stud."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"101708","DOI":"10.1016\/j.poetic.2022.101708","article-title":"Social stratification and social media disengagement. The effect of economic, cultural and social capital on reasons for non-use of social media platforms","volume":"95","author":"Willekens","year":"2022","journal-title":"Poetics"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"546","DOI":"10.1080\/09502386.2024.2384942","article-title":"Uncovering the uncoverers: Identity, performativity and representation in counter-disinformation discourse","volume":"39","author":"Hutchings","year":"2025","journal-title":"Cult. Stud."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"20563051231177938","DOI":"10.1177\/20563051231177938","article-title":"Political influencers on social media: An introduction","volume":"9","author":"Riedl","year":"2023","journal-title":"Soc. Media Soc."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1016\/j.im.2016.05.006","article-title":"Digitally enabled crime-fighting communities: Harnessing the boundary spanning competence of social media for civic engagement","volume":"54","author":"Tim","year":"2017","journal-title":"Inf. Manag."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"102599","DOI":"10.1016\/j.telpol.2023.102599","article-title":"Exploring the role of data enclosure in the digital political economy","volume":"47","author":"Kuerbis","year":"2023","journal-title":"Telecommun. Policy"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1016\/j.chb.2014.10.059","article-title":"Information disclosure on social networking sites: An intrinsic-extrinsic motivation perspective","volume":"44","author":"Shibchurn","year":"2015","journal-title":"Comput. Hum. Behav."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1016\/j.jbusres.2020.12.006","article-title":"Information disclosure in e-commerce: A systematic review and agenda for future research","volume":"126","author":"Xia","year":"2021","journal-title":"J. Bus. Res."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"101344","DOI":"10.1016\/j.jacceco.2020.101344","article-title":"Disclosure processing costs, investors\u2019 information choice, and equity market outcomes: A review","volume":"70","author":"Blankespoor","year":"2020","journal-title":"J. Account. Econ."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"106450","DOI":"10.1016\/j.chb.2020.106450","article-title":"How consumers cope with location-based advertising (LBA) and personal information disclosure: The mediating role of persuasion knowledge, perceived benefits and harms, and attitudes toward LBA","volume":"112","author":"Ryu","year":"2020","journal-title":"Comput. Hum. Behav."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"1144","DOI":"10.1016\/j.ijhcs.2013.06.003","article-title":"Dimensionality of information disclosure behavior","volume":"71","author":"Knijnenburg","year":"2013","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"101309","DOI":"10.1016\/j.copsyc.2022.101309","article-title":"Revealing the self in a digital world: A systematic review of adolescent online and offline self-disclosure","volume":"45","author":"Towner","year":"2022","journal-title":"Curr. Opin. Psychol."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"901","DOI":"10.1177\/1464884919850387","article-title":"The effects of journalistic transparency on credibility assessments and engagement intentions","volume":"22","author":"Curry","year":"2021","journal-title":"Journalism"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1017\/bpp.2020.11","article-title":"The impact of online platform transparency of information on consumers\u2019 choices","volume":"7","author":"Veltri","year":"2023","journal-title":"Behav. Public Policy"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"1176","DOI":"10.1108\/JPBM-03-2020-2803","article-title":"Effects of transparent brand communication on perceived brand authenticity and consumer responses","volume":"30","author":"Yang","year":"2021","journal-title":"J. Prod. Brand Manag."},{"key":"ref_53","first-page":"7","article-title":"Transparency or accountability? The purpose of online technologies for nonprofits","volume":"18","author":"Dumont","year":"2013","journal-title":"Int. Rev. Public Adm."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"701","DOI":"10.1108\/JIC-02-2019-0039","article-title":"Digital transparency and public accountability in Spanish universities in online media","volume":"20","author":"Tejada","year":"2019","journal-title":"J. Intellect. Cap."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"e50048","DOI":"10.2196\/50048","article-title":"Toward fairness, accountability, transparency, and ethics in AI for social media and health care: Scoping review","volume":"12","author":"Singhal","year":"2024","journal-title":"JMIR Med. Inform."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"113798","DOI":"10.1016\/j.dss.2022.113798","article-title":"Data misrepresentation detection for insurance underwriting fraud prevention","volume":"159","author":"Vandervorst","year":"2022","journal-title":"Decis. Support Syst."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"510","DOI":"10.1287\/isre.2019.0900","article-title":"A theory of multilevel information privacy management for the digital era","volume":"31","author":"James","year":"2020","journal-title":"Inf. Syst. Res."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"72","DOI":"10.55177\/tc304825","article-title":"From Interpersonal Privacy to Human\u2014Technological Privacy: Communication Privacy Management Theory Revisited","volume":"71","author":"Meng","year":"2024","journal-title":"Tech. Commun."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"444","DOI":"10.1016\/j.chb.2014.03.010","article-title":"Managing privacy boundaries together: Exploring individual and group privacy management strategies in Facebook","volume":"35","author":"Willaert","year":"2014","journal-title":"Comput. Hum. Behav."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"551","DOI":"10.1007\/s10551-015-2565-9","article-title":"Understanding privacy online: Development of a social contract approach to privacy","volume":"137","author":"Martin","year":"2016","journal-title":"J. Bus. Ethics"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"152","DOI":"10.24908\/ss.v1i2.3351","article-title":"Information technology, privacy, and power within organizations: A view from boundary theory and social exchange perspectives","volume":"1","author":"Stanton","year":"2003","journal-title":"Surveill. Soc."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Acquisti, A., Brandimarte, L., and Loewenstein, G. (2018). Privacy and human behavior in the information age. The Cambridge Handbook of Consumer Privacy, Cambridge University Press.","DOI":"10.1017\/9781316831960.010"},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1080\/10510974.2018.1426617","article-title":"The emotional, behavioral, and cognitive experience of boundary turbulence","volume":"69","author":"Aloia","year":"2018","journal-title":"Commun. Stud."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3479504","article-title":"Collective privacy management practices: A study of privacy strategies and risks in a private Facebook group","volume":"5","author":"Mansour","year":"2021","journal-title":"Proc. ACM Hum. Comput. Interact."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"1058","DOI":"10.1177\/1461444819876570","article-title":"Contextualizing how teens manage personal and interpersonal privacy on social media","volume":"22","year":"2020","journal-title":"New Media Soc."},{"key":"ref_66","unstructured":"Craig, M.J., and Child, J.T. (2025, October 24). What\u2019s Mine Is (Not) Yours: A CPM Analysis of Privacy Breakdowns and Recalibration Practices in the Social Media Algorithm Context. 2024, Preprint. Available online: https:\/\/osf.io\/preprints\/socarxiv\/mqckr."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"543","DOI":"10.1007\/s13347-017-0263-5","article-title":"Algorithmic accountability and public reason","volume":"31","author":"Binns","year":"2018","journal-title":"Philos. Technol."},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"2053951716679679","DOI":"10.1177\/2053951716679679","article-title":"The ethics of algorithms: Mapping the debate","volume":"3","author":"Mittelstadt","year":"2016","journal-title":"Big Data Soc."},{"key":"ref_69","doi-asserted-by":"crossref","unstructured":"Selbst, A.D., Boyd, D., Friedler, S.A., Venkatasubramanian, S., and Vertesi, J. (2019, January 29\u201331). Fairness and abstraction in sociotechnical systems. Proceedings of the Conference on Fairness, Accountability, and Transparency, Atlanta, GA, USA.","DOI":"10.1145\/3287560.3287598"},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1093\/jcmc\/zmaa004","article-title":"Privacy management and self-disclosure on social network sites: The moderating effects of stress and gender","volume":"25","author":"Zhang","year":"2020","journal-title":"J. Comput. Mediat. Commun."},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"e35","DOI":"10.1017\/dap.2021.35","article-title":"Responsible innovation for digital identity systems","volume":"3","author":"Anand","year":"2021","journal-title":"Data Policy"},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1177\/01605976221137714","article-title":"Living as socially marked individuals: Two stories on stigma and its consequences","volume":"47","author":"Dollar","year":"2023","journal-title":"Humanit. Soc."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"603","DOI":"10.1007\/s12599-021-00722-y","article-title":"Digital identities and verifiable credentials","volume":"63","author":"Sedlmeir","year":"2021","journal-title":"Bus. Inf. Syst. Eng."},{"key":"ref_74","unstructured":"Windley, P.J. (2005). Digital Identity: Unmasking Identity Management Architecture (IMA), O\u2019Reilly Media, Inc."},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"3931","DOI":"10.1177\/14614448241232589","article-title":"How do we speak about algorithms and algorithmic media futures? Using vignettes and scenarios in a citizen council on data-driven media personalisation","volume":"27","author":"Das","year":"2024","journal-title":"New Media Soc."},{"key":"ref_76","unstructured":"Head, A.J., Fister, B., and MacMillan, M. (2020). Information Literacy in the Age of Algorithms: Student Experiences with News and Information, and the Need for Change. Proj. Inf. Lit., 55, Available online: https:\/\/eric.ed.gov\/?id=ED605109."},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3479577","article-title":"Everyday algorithm auditing: Understanding the power of everyday users in surfacing harmful algorithmic behaviors","volume":"5","author":"Shen","year":"2021","journal-title":"Proc. ACM Hum. Comput. Interact."},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"100","DOI":"10.3126\/jps.v21i0.35268","article-title":"Diaspora and cultural identity: A conceptual review","volume":"21","author":"Bhandari","year":"2021","journal-title":"J. Political Sci."},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1177\/02704676211064567","article-title":"Does the internet make the world worse? Depression, aggression and polarization in the social media age","volume":"41","author":"Ferguson","year":"2021","journal-title":"Bull. Sci. Technol. Soc."},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"1980","DOI":"10.1177\/14648849221085389","article-title":"Disconnecting from digital news: News avoidance and the ignored role of social class","volume":"24","author":"Lindell","year":"2023","journal-title":"Journalism"},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1007\/s41060-022-00311-6","article-title":"The disaster of misinformation: A review of research in social media","volume":"13","author":"Muhammed","year":"2022","journal-title":"Int. J. Data Sci. Anal."},{"key":"ref_82","doi-asserted-by":"crossref","unstructured":"Turel, O., and Osatuyi, B. (2023). Biased credibility and sharing of fake news on social media: Considering peer context and self-objectivity state. Fake News on the Internet, Routledge.","DOI":"10.4324\/9781003433934-3"},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"885","DOI":"10.1007\/s11186-023-09520-9","article-title":"How algorithms are reshaping the exploitation of labour-power: Insights into the process of labour invisibilization in the platform economy","volume":"52","author":"Cini","year":"2023","journal-title":"Theory Soc."},{"key":"ref_84","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1177\/01634437221111923","article-title":"Platform governance at the margins: Social media creators\u2019 experiences with algorithmic (in)visibility","volume":"45","author":"Duffy","year":"2023","journal-title":"Media Cult. Soc."},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"e6","DOI":"10.1017\/dap.2024.1","article-title":"Algorithmic attention rents: A theory of digital platform market power","volume":"6","author":"Strauss","year":"2024","journal-title":"Data Policy"},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"1019","DOI":"10.1080\/01605682.2024.2407454","article-title":"The role of information visibility on healthcare resource network performance: An agent-based simulation approach","volume":"76","author":"Piffari","year":"2025","journal-title":"J. Oper. Res. Soc."},{"key":"ref_87","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1177\/1368431020983224","article-title":"Habermas and the public sphere: Rethinking a key theoretical concept","volume":"24","year":"2021","journal-title":"Eur. J. Soc. Theory"},{"key":"ref_88","doi-asserted-by":"crossref","first-page":"1031","DOI":"10.1111\/gwao.13097","article-title":"Networked feminism in a digital age\u2014Mobilizing vulnerability and reconfiguring feminist politics in digital activism","volume":"31","author":"Vachhani","year":"2024","journal-title":"Gend. Work. Organ."},{"key":"ref_89","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1007\/s13347-024-00789-x","article-title":"Beyond the digital public sphere: Towards a political ontology of algorithmic technologies","volume":"37","year":"2024","journal-title":"Philos. Technol."},{"key":"ref_90","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1080\/13621025.2021.2012312","article-title":"Emerging digital citizenship regimes: Pandemic, algorithmic, liquid, metropolitan, and stateless citizenships","volume":"27","author":"Calzada","year":"2023","journal-title":"Citizsh. Stud."},{"key":"ref_91","first-page":"102690","article-title":"Digital transparency and the usefulness for open government","volume":"73","author":"Matheus","year":"2023","journal-title":"Int. J. Inf. Manag."},{"key":"ref_92","doi-asserted-by":"crossref","first-page":"101680","DOI":"10.1016\/j.giq.2022.101680","article-title":"Transparency and accountability in digital public services: Learning from the Brazilian cases","volume":"39","author":"Saldanha","year":"2022","journal-title":"Gov. Inf. Q."},{"key":"ref_93","doi-asserted-by":"crossref","first-page":"660","DOI":"10.1080\/02681102.2022.2046533","article-title":"Digital citizen empowerment: A systematic literature review of theories and development models","volume":"28","author":"Sharma","year":"2022","journal-title":"Inf. Technol. Dev."},{"key":"ref_94","doi-asserted-by":"crossref","first-page":"101868","DOI":"10.1016\/j.giq.2023.101868","article-title":"Digital transparency and citizen participation: Evidence from the online crowdsourcing platform of the City of Sacramento","volume":"40","author":"Zhao","year":"2023","journal-title":"Gov. Inf. Q."},{"key":"ref_95","doi-asserted-by":"crossref","first-page":"20539517211065368","DOI":"10.1177\/20539517211065368","article-title":"The chilling effects of digital dataveillance: A theoretical model and an empirical research agenda","volume":"9","author":"Festic","year":"2022","journal-title":"Big Data Soc."},{"key":"ref_96","doi-asserted-by":"crossref","first-page":"114490","DOI":"10.1016\/j.jbusres.2023.114490","article-title":"Ethical side-effect of dataveillance in advertising: Impact of data collection, trust, privacy concerns and regulatory differences on chilling effects","volume":"173","author":"Strycharz","year":"2024","journal-title":"J. Bus. Res."},{"key":"ref_97","doi-asserted-by":"crossref","first-page":"107949","DOI":"10.1016\/j.chb.2023.107949","article-title":"Is knowledge power? Testing whether knowledge affects chilling effects and privacy-protective behaviors using browser histories","volume":"150","author":"Stubenvoll","year":"2024","journal-title":"Comput. Hum. Behav."},{"key":"ref_98","first-page":"147","article-title":"Governance and design of digital platforms: A review and future research directions on a meta-organization","volume":"48","author":"Chen","year":"2022","journal-title":"J. Manag."},{"key":"ref_99","doi-asserted-by":"crossref","first-page":"101777","DOI":"10.1016\/j.giq.2022.101777","article-title":"Designing boundary resources in digital government platforms for collaborative service innovation","volume":"40","author":"Gong","year":"2023","journal-title":"Gov. Inf. Q."},{"key":"ref_100","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1108\/AJIM-03-2021-0068","article-title":"Government data governance framework based on a data middle platform","volume":"74","author":"Mao","year":"2022","journal-title":"Aslib J. Inf. Manag."},{"key":"ref_101","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1287\/stsc.2023.0006","article-title":"Soft governance across digital platforms using transparency","volume":"9","author":"Doshi","year":"2024","journal-title":"Strategy Sci."},{"key":"ref_102","first-page":"285","article-title":"Hard and soft governance mechanisms for large projects. A historical perspective","volume":"31","author":"Giorgino","year":"2025","journal-title":"J. Manag. Hist."},{"key":"ref_103","doi-asserted-by":"crossref","unstructured":"Balendra, S. (2024). Free Speech in the Puzzle of Content Regulation, Springer.","DOI":"10.1007\/978-3-031-75813-3"},{"key":"ref_104","doi-asserted-by":"crossref","unstructured":"Gorwa, R. (2024). The Politics of Platform Regulation: How Governments Shape Online Content Moderation, Oxford University Press.","DOI":"10.1093\/oso\/9780197692851.001.0001"},{"key":"ref_105","doi-asserted-by":"crossref","first-page":"739","DOI":"10.1007\/s13347-020-00429-0","article-title":"Algorithmic censorship by social platforms: Power and resistance","volume":"34","author":"Cobbe","year":"2021","journal-title":"Philos. Technol."},{"key":"ref_106","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1093\/icc\/dtab052","article-title":"Can self-regulation save digital platforms?","volume":"30","author":"Cusumano","year":"2021","journal-title":"Ind. Corp. Chang."},{"key":"ref_107","doi-asserted-by":"crossref","unstructured":"Gosztonyi, G. (2023). Censorship from Plato to Social Media. The Complexity of Social Media\u2019s Content Regulation and Moderation Practices, Springer Nature.","DOI":"10.1007\/978-3-031-46529-1"},{"key":"ref_108","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1080\/01972243.2024.2332319","article-title":"Identifying undefined risks: A risk model and a privacy risk identification measure in the privacy impact assessment process","volume":"40","author":"Kuroda","year":"2024","journal-title":"Inf. Soc."},{"key":"ref_109","doi-asserted-by":"crossref","first-page":"e12962","DOI":"10.1111\/soc4.12962","article-title":"Artificial intelligence, algorithms, and social inequality: Sociological contributions to contemporary debates","volume":"16","author":"Zajko","year":"2022","journal-title":"Sociol. Compass"},{"key":"ref_110","doi-asserted-by":"crossref","first-page":"2996","DOI":"10.1177\/14614448231218989","article-title":"Civilizing social media: The effect of geolocation on the incivility of news comments","volume":"27","author":"Guo","year":"2025","journal-title":"New Media Soc."},{"key":"ref_111","doi-asserted-by":"crossref","first-page":"1574","DOI":"10.1002\/mar.21998","article-title":"Transformative privacy calculus: Conceptualizing the personalization-privacy paradox on social media","volume":"41","author":"Cloarec","year":"2024","journal-title":"Psychol. Mark."},{"key":"ref_112","doi-asserted-by":"crossref","first-page":"667","DOI":"10.1016\/j.jbusres.2020.02.006","article-title":"Does self-disclosure matter? A dynamic two-stage perspective for the personalization-privacy paradox","volume":"124","author":"Zeng","year":"2021","journal-title":"J. Bus. Res."},{"key":"ref_113","doi-asserted-by":"crossref","unstructured":"Kumar, S., and Gupta, M. (2021). A review of focused crawling schemes for search engine. Smart Trends in Computing and Communications: Proceedings of SmartCom 2020, Springer.","DOI":"10.1007\/978-981-15-5224-3_30"},{"key":"ref_114","doi-asserted-by":"crossref","unstructured":"Zhang, B., Lin, J., Luo, M., Zeng, C., Feng, J., Zhou, M., and Deng, F. (2022). Changes in public sentiment under the background of major emergencies\u2014Taking the Shanghai epidemic as an example. Int. J. Environ. Res. Public Health, 19.","DOI":"10.3390\/ijerph191912594"},{"key":"ref_115","first-page":"25","article-title":"Text mining: Use of TF-IDF to examine the relevance of words to documents","volume":"181","author":"Qaiser","year":"2018","journal-title":"Int. J. Comput. Appl."},{"key":"ref_116","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1186\/s13673-019-0192-7","article-title":"Research paper classification systems based on TF-IDF and LDA schemes","volume":"9","author":"Kim","year":"2019","journal-title":"Hum. Centric Comput. Inf. Sci."},{"key":"ref_117","doi-asserted-by":"crossref","unstructured":"Farkhod, A., Abdusalomov, A., Makhmudov, F., and Cho, Y.I. (2021). LDA-based topic modeling sentiment analysis using topic\/document\/sentence (TDS) model. Appl. Sci., 11.","DOI":"10.3390\/app112311091"},{"key":"ref_118","doi-asserted-by":"crossref","first-page":"15169","DOI":"10.1007\/s11042-018-6894-4","article-title":"Latent Dirichlet allocation (LDA) and topic modeling: Models, applications, a survey","volume":"78","author":"Jelodar","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref_119","doi-asserted-by":"crossref","first-page":"106480","DOI":"10.1016\/j.chb.2020.106480","article-title":"Do men become addicted to internet gaming and women to social media? A meta-analysis examining gender-related differences in specific internet addiction","volume":"113","author":"Su","year":"2020","journal-title":"Comput. Hum. Behav."},{"key":"ref_120","doi-asserted-by":"crossref","first-page":"2723","DOI":"10.1177\/1461444815604133","article-title":"Privates in the online public: Sex(ting) and reputation on social media","volume":"18","author":"Salter","year":"2016","journal-title":"New Media Soc."},{"key":"ref_121","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1108\/AJIM-03-2018-0072","article-title":"Understanding the trust building mechanisms in social media: Regulatory effectiveness, trust transfer, and gender difference","volume":"70","author":"Sun","year":"2018","journal-title":"Aslib J. Inf. Manag."},{"key":"ref_122","first-page":"127","article-title":"Privacy at work: A review and a research agenda for a contested terrain","volume":"46","author":"Bhave","year":"2020","journal-title":"J. Manag."},{"key":"ref_123","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1080\/01972243.2017.1354108","article-title":"Beyond individual-centric privacy: Information technology in social systems","volume":"33","author":"Pieters","year":"2017","journal-title":"Inf. Soc."},{"key":"ref_124","doi-asserted-by":"crossref","first-page":"970","DOI":"10.1007\/s11469-018-9962-0","article-title":"Female gamers\u2019 experience of online harassment and social support in online gaming: A qualitative study","volume":"17","author":"McLean","year":"2019","journal-title":"Int. J. Ment. Health Addict."},{"key":"ref_125","doi-asserted-by":"crossref","unstructured":"Navarro, R. (2016). Gender issues and cyberbullying in children and adolescents: From gender differences to gender identity measures. Cyberbullying Across the Globe: Gender, Family, and Mental Health, Springer Nature.","DOI":"10.1007\/978-3-319-25552-1"},{"key":"ref_126","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1089\/vio.2017.0056","article-title":"Networked individuals, gendered violence: A literature review of cyberviolence","volume":"5","author":"Backe","year":"2018","journal-title":"Violence Gend."},{"key":"ref_127","doi-asserted-by":"crossref","unstructured":"Kar, R.B., and Yu, X. (2024). The Contractual Death and Rebirth of Privacy. Harv. J. Law Technol., 38.","DOI":"10.2139\/ssrn.4939708"},{"key":"ref_128","doi-asserted-by":"crossref","first-page":"102152","DOI":"10.1016\/j.telpol.2021.102152","article-title":"Democratic legitimacy in global platform governance","volume":"45","author":"Haggart","year":"2021","journal-title":"Telecommun. Policy"},{"key":"ref_129","doi-asserted-by":"crossref","first-page":"e433","DOI":"10.1002\/poi3.433","article-title":"Digital Regulation and Questions of Legitimacy","volume":"17","author":"Moss","year":"2025","journal-title":"Policy Internet"},{"key":"ref_130","doi-asserted-by":"crossref","unstructured":"Xiao, Y. (2025). Transparency and privacy on social media: Privacy policies for enhancing users\u2019 control on social media. Int. J. Hum. Comput. Interact., 1\u201320.","DOI":"10.1080\/10447318.2025.2482739"},{"key":"ref_131","doi-asserted-by":"crossref","first-page":"1","DOI":"10.14763\/2021.4.1612","article-title":"Digital democracy","volume":"10","author":"Berg","year":"2021","journal-title":"Internet Policy Rev."},{"key":"ref_132","doi-asserted-by":"crossref","unstructured":"Ghadge, N. (2024). Enhancing Identity Management: Best Practices for Governance and Administration. Comput. Sci. Inf. Technol., 219\u2013228.","DOI":"10.5121\/csit.2024.141119"},{"key":"ref_133","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s13347-023-00692-x","article-title":"Enhancing deliberation with digital democratic innovations","volume":"37","author":"Mikhaylovskaya","year":"2024","journal-title":"Philos. Technol."},{"key":"ref_134","doi-asserted-by":"crossref","first-page":"1681","DOI":"10.1057\/s41599-024-04245-1","article-title":"Direct democracy in the digital age: Opportunities, challenges, and new approaches","volume":"11","author":"Rattanasevee","year":"2024","journal-title":"Humanit. Soc. Sci. Commun."},{"key":"ref_135","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/j.jpubeco.2007.09.001","article-title":"The old boy (and girl) network: Social network formation on university campuses","volume":"92","author":"Mayer","year":"2008","journal-title":"J. Public Econ."},{"key":"ref_136","doi-asserted-by":"crossref","first-page":"330","DOI":"10.1016\/j.socnet.2008.07.002","article-title":"Tastes, ties, and time: A new social network dataset using Facebook.com","volume":"30","author":"Lewis","year":"2008","journal-title":"Soc. Netw."},{"key":"ref_137","doi-asserted-by":"crossref","first-page":"526","DOI":"10.1137\/080734315","article-title":"Comparing community structure to characteristics in online collegiate social networks","volume":"53","author":"Red","year":"2011","journal-title":"SIAM Rev."},{"key":"ref_138","doi-asserted-by":"crossref","unstructured":"Smirnov, I., and Thurner, S. (2017). Formation of homophily in academic performance: Students change their friends rather than performance. PLoS ONE, 12.","DOI":"10.1371\/journal.pone.0183473"},{"key":"ref_139","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1086\/653658","article-title":"Beyond and below racial homophily: ERG models of a friendship network documented on Facebook","volume":"116","author":"Wimmer","year":"2010","journal-title":"Am. J. Sociol."},{"key":"ref_140","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1016\/j.jhealeco.2013.11.006","article-title":"Peer effects on risky behaviors: New evidence from college roommate assignments","volume":"33","author":"Eisenberg","year":"2014","journal-title":"J. Health Econ."},{"key":"ref_141","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.econedurev.2017.06.001","article-title":"Acculturational homophily","volume":"59","author":"Xu","year":"2017","journal-title":"Econ. Educ. Rev."},{"key":"ref_142","first-page":"1274","article-title":"Beyond the core: Who has larger social networks?","volume":"99","author":"Hofstra","year":"2021","journal-title":"Soc. Forces"},{"key":"ref_143","doi-asserted-by":"crossref","first-page":"845","DOI":"10.1093\/qje\/qjab047","article-title":"Old boys\u2019 clubs and upward mobility among the educational elite","volume":"137","author":"Michelman","year":"2022","journal-title":"Q. J. Econ."},{"key":"ref_144","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1002\/smj.3653","article-title":"Rewiring the organizational network: Corporate offsites and network tie formation","volume":"46","author":"Kneeland","year":"2025","journal-title":"Strateg. Manag. J."},{"key":"ref_145","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1016\/j.telpol.2018.12.003","article-title":"Are social media companies motivated to be good corporate citizens? Examination of the connection between corporate social responsibility and social media safety","volume":"43","author":"Grygiel","year":"2019","journal-title":"Telecommun. Policy"},{"key":"ref_146","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1080\/01972243.2022.2027833","article-title":"Management and mitigation of location privacy violations: Case study analysis of US local governments","volume":"38","author":"Pick","year":"2022","journal-title":"Inf. Soc."},{"key":"ref_147","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1002\/mar.20803","article-title":"A taxonomy of social networking site users: Social surveillance and self-surveillance perspective","volume":"32","author":"Park","year":"2015","journal-title":"Psychol. Mark."},{"key":"ref_148","doi-asserted-by":"crossref","first-page":"276","DOI":"10.1016\/j.chb.2018.04.041","article-title":"Why do college students prefer Facebook, Twitter, or Instagram? Site affordances, tensions between privacy and self-expression, and implications for social capital","volume":"86","author":"Manago","year":"2018","journal-title":"Comput. Hum. Behav."},{"key":"ref_149","doi-asserted-by":"crossref","unstructured":"Chen, X., Xie, J., Wang, Z., Shen, B., and Zhou, Z. (2023). How We Express Ourselves Freely: Censorship, Self-censorship, and Anti-censorship on a Chinese Social Media. International Conference on Information, Springer Nature.","DOI":"10.1007\/978-3-031-28032-0_8"},{"key":"ref_150","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1016\/j.intfin.2018.11.015","article-title":"Corporate governance, external control, and environmental information transparency: Evidence from emerging markets","volume":"58","author":"Jacoby","year":"2019","journal-title":"J. Int. Financ. Mark. Inst. Money"},{"key":"ref_151","doi-asserted-by":"crossref","first-page":"102477","DOI":"10.1016\/j.telpol.2022.102477","article-title":"How transparent are transparency reports? Comparative analysis of transparency reporting across online platforms","volume":"47","author":"Urman","year":"2023","journal-title":"Telecommun. Policy"},{"key":"ref_152","doi-asserted-by":"crossref","first-page":"102143","DOI":"10.1016\/j.telpol.2021.102143","article-title":"What rules the Internet? A study of the troubled relation between Web standards and legal instruments in the field of privacy","volume":"45","author":"Rossi","year":"2021","journal-title":"Telecommun. Policy"},{"key":"ref_153","doi-asserted-by":"crossref","first-page":"618","DOI":"10.1037\/amp0000662","article-title":"Effects of the COVID-19 pandemic and nationwide lockdown on trust, attitudes toward government, and well-being","volume":"75","author":"Sibley","year":"2020","journal-title":"Am. Psychol."},{"key":"ref_154","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/j.tele.2019.03.003","article-title":"Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources","volume":"41","author":"Barth","year":"2019","journal-title":"Telemat. Inform."},{"key":"ref_155","first-page":"102494","article-title":"Algorithm awareness: Why user awareness is critical for personal privacy in the adoption of algorithmic platforms?","volume":"65","author":"Shin","year":"2022","journal-title":"Int. J. Inf. Manag."},{"key":"ref_156","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1080\/01972243.2015.1107167","article-title":"The emotional context of information privacy","volume":"32","author":"Stark","year":"2016","journal-title":"Inf. Soc."}],"container-title":["Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2079-8954\/13\/11\/975\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T19:57:54Z","timestamp":1762199874000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2079-8954\/13\/11\/975"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,1]]},"references-count":156,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2025,11]]}},"alternative-id":["systems13110975"],"URL":"https:\/\/doi.org\/10.3390\/systems13110975","relation":{},"ISSN":["2079-8954"],"issn-type":[{"value":"2079-8954","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,1]]}}}