{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T18:36:09Z","timestamp":1725906969734},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,4,15]],"date-time":"2023-04-15T00:00:00Z","timestamp":1681516800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,4,15]],"date-time":"2023-04-15T00:00:00Z","timestamp":1681516800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Fraunhofer-Institut f\u00fcr Angewandte Informationstechnik FIT"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Electron Markets"],"published-print":{"date-parts":[[2023,12]]},"abstract":"Abstract\n<\/jats:title>The introduction of blockchain offers new opportunities to rethink enterprise identity management. Recently, a new concept has emerged in the blockchain community called self-sovereign identity. Self-sovereign identity combines several existing decentralized identity management approaches, promising new ways to promote more convenient, connected, and secure identity services for the private and public sector. Nevertheless, research in this area is still in its infancy. Most of the very few articles focus either on the opportunities self-sovereign identity might offer or on very specific technical features. Studies on real-world applications of organizations using modern self-sovereign identity implementations and design theory are very rare. To fill this gap, we follow the design science research approach to design, implement, and evaluate a self-sovereign identity system to present tax attributes of online retailers. We present four design principles and conclude that the use of self-sovereign identity and blockchain offers opportunities to improve verification processes.<\/jats:p>","DOI":"10.1007\/s12525-023-00620-z","type":"journal-article","created":{"date-parts":[[2023,4,15]],"date-time":"2023-04-15T02:02:07Z","timestamp":1681524127000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Designing a cross-organizational identity management system: Utilizing SSI for the certification of retailer attributes"],"prefix":"10.1007","volume":"33","author":[{"given":"Tobias","family":"Guggenberger","sequence":"first","affiliation":[]},{"given":"Daniela","family":"K\u00fchne","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Schlatt","sequence":"additional","affiliation":[]},{"given":"Nils","family":"Urbach","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,15]]},"reference":[{"key":"620_CR1","unstructured":"Allen, C. (2016). The path to self-sovereign identity, available at http:\/\/www.lifewithalacrity.com\/2016\/04\/the-path-to-self-soverereign-identity.html. Accessed 3 Dec\u00a02022."},{"key":"620_CR2","doi-asserted-by":"publisher","unstructured":"Arnold, L., Brennecke, M., Camus, P., Fridgen, G., Guggenberger, T., Radszuwill, S., Rieger, A., Schweizer, A., & Urbach, N. (2019). Blockchain and initial coin offerings: Blockchain\u2019s implications for crowdfunding. In H. Treiblmaier & R. Beck (Eds.) Business Transformation through blockchain\u00a0(pp. 233\u2013272). Cham: Springer International Publishing. https:\/\/doi.org\/10.1007\/978-3-319-98911-2_8.","DOI":"10.1007\/978-3-319-98911-2_8"},{"key":"620_CR3","doi-asserted-by":"publisher","unstructured":"Baskerville, R., Baiyere, A., Gergor, S., Hevner, A., & Rossi, M. (2018). Design science research contributions: Finding a Balance between artifact and theory. Journal of the Association for Information Systems, 19(5), 358\u2013376. https:\/\/doi.org\/10.17705\/1jais.00495.","DOI":"10.17705\/1jais.00495"},{"key":"620_CR4","unstructured":"Bitnation. (2017). BITNATION and Pangea Documents, resources and contributor guidelines, available at https:\/\/github.com\/Bit-Nation\/Pangea-Docs. Accessed 26 Jul\u00a02022."},{"key":"620_CR5","doi-asserted-by":"publisher","unstructured":"Byun, D. H., & Finnie, G. (2011). Evaluating usability, user satisfaction and intention to revisit for successful e-government websites. Electronic Government, an International Journal, 8(1), 1. https:\/\/doi.org\/10.1504\/EG.2011.037694.","DOI":"10.1504\/EG.2011.037694"},{"key":"620_CR6","doi-asserted-by":"publisher","unstructured":"Camenisch, J., & Lysyanskaya, A. (2002). Dynamic accumulators and application to efficient revocation of anonymous credentials. Annual International Cryptology Conference, 61\u201376. https:\/\/doi.org\/10.1007\/3-540-45708-9","DOI":"10.1007\/3-540-45708-9"},{"key":"620_CR7","doi-asserted-by":"publisher","unstructured":"Cao, Y., & Yang, L. (2010). A survey of identity management technology. 2010 IEEE International Conference on Information Theory and Information Security, Beijing, China. 2010, IEEE, 287\u2013293. https:\/\/doi.org\/10.1109\/ICITIS.2010.5689468.","DOI":"10.1109\/ICITIS.2010.5689468"},{"key":"620_CR8","doi-asserted-by":"publisher","unstructured":"Carretero, J., Izquierdo-Moreno, G., Vasile-Cabezas, M., & Garcia-Blas, J. (2018). Federated identity architecture of the European eID system. IEEE Access, 6, 75302\u201375326. https:\/\/doi.org\/10.1109\/ACCESS.2018.2882870","DOI":"10.1109\/ACCESS.2018.2882870"},{"key":"620_CR9","doi-asserted-by":"publisher","unstructured":"Carter, L., & Ubacht, J. (2018). Blockchain applications in government. Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age, 1\u20132. https:\/\/doi.org\/10.1145\/3209281.3209329","DOI":"10.1145\/3209281.3209329"},{"issue":"4","key":"620_CR10","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1177\/0001839217733972","volume":"63","author":"BB Caza","year":"2018","unstructured":"Caza, B. B., Moss, S., & Vough, H. (2018). From synchronizing to harmonizing: The process of authenticating multiple work identities. Administrative Science Quarterly, 63(4), 703\u2013745. https:\/\/doi.org\/10.1177\/0001839217733972","journal-title":"Administrative Science Quarterly"},{"issue":"2","key":"620_CR11","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/S1389-1286(01)00217-1","volume":"37","author":"S Clau\u00df","year":"2001","unstructured":"Clau\u00df, S., & K\u00f6hntopp, M. (2001). Identity management and its support of multilateral security. Computer Networks, 37(2), 205\u2013219. https:\/\/doi.org\/10.1016\/S1389-1286(01)00217-1","journal-title":"Computer Networks"},{"key":"620_CR12","unstructured":"Decentralized Identity Foundation. (2021). GitHub - Decentralized-identity\/universal-resolver: Universal Resolver implementation and drivers, available at https:\/\/github.com\/decentralized-identity\/universal-resolver. Accessed 12 Dec\u00a02022."},{"key":"620_CR13","unstructured":"Der, U., J\u00e4hnichen, S., & S\u00fcrmeli, J. (2017). Self-sovereign identity - Opportunities and challenges for the digital revolution. arXiv preprint. https:\/\/arxiv.org\/abs\/1712.01767"},{"key":"620_CR14","doi-asserted-by":"publisher","unstructured":"Dunphy, P., & Petitcolas, F. A. P. (2018). A first look at identity management schemes on the blockchain. IEEE security & privacy, 16(4), 20\u201329. https:\/\/doi.org\/10.1109\/MSP.2018.3111247","DOI":"10.1109\/MSP.2018.3111247"},{"key":"620_CR15","doi-asserted-by":"publisher","unstructured":"Elisa, N., Yang, L., Chao, F., & Cao, Y. (2018). A framework of blockchain-based secure and privacy-preserving E-government system. Wireless networks, 1\u201311. https:\/\/doi.org\/10.1007\/s11276-018-1883-0","DOI":"10.1007\/s11276-018-1883-0"},{"key":"620_CR16","unstructured":"EUR-Lex. (2014). Regulation (EU) No 910\/2014 of the European Parliament and of the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999\/93\/EC, available at http:\/\/data.europa.eu\/eli\/reg\/2014\/910\/oj. Accessed 5 Jan\u00a02022."},{"key":"620_CR17","unstructured":"European Commission. (2020). The Commission has launched a public consultation on the revision of the rules on electronic identification and trust services for electronic transactions in the internal market, the eIDAS Regulation, available at https:\/\/ec.europa.eu\/digital-single-market\/en\/news\/digital-identity-and-trust-commission-launches-public-consultation-eidas-regulation. Accessed 31 Jul\u00a02022."},{"key":"620_CR18","unstructured":"European Commission. (2021). Study to support the impact assessment for the revision of the eIDAS regulation, available at https:\/\/op.europa.eu\/en\/publication-detail\/-\/publication\/9ce0f9e5-03bb-11ec-8f47-01aa75ed71a1\/language-en\/format-PDF\/source-225913375. Accessed 5 Dec\u00a02022."},{"key":"620_CR19","doi-asserted-by":"publisher","unstructured":"Faber, B., Michelet, G. C., Weidmann, N., Mukkamala, R. R., & Vatrapu, R. (2019). BPDIMS:A blockchain-based personal data and identity management system. In Bui, T. (Ed.),\u00a0Proceedings of the 52nd Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences.\u00a0https:\/\/doi.org\/10.24251\/HICSS.2019.821.","DOI":"10.24251\/HICSS.2019.821"},{"key":"620_CR20","doi-asserted-by":"publisher","first-page":"103059","DOI":"10.1109\/ACCESS.2019.2931173","volume":"7","author":"MS Ferdous","year":"2019","unstructured":"Ferdous, M. S., Chowdhury, F., & Alassafi, M. O. (2019). In search of self-sovereign identity leveraging blockchain technology. IEEE Access, 7, 103059\u2013103079. https:\/\/doi.org\/10.1109\/ACCESS.2019.2931173","journal-title":"IEEE Access"},{"key":"620_CR21","doi-asserted-by":"publisher","unstructured":"Gao, Z., Xu, L., Turner, G., Patel, B., Diallo, N., Chen, L., & Shi, W. (2018). Blockchain-based identity management with mobile device. Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems, 66\u201370. https:\/\/doi.org\/10.1145\/3211933.3211945","DOI":"10.1145\/3211933.3211945"},{"key":"620_CR22","unstructured":"Garfinkel, S. (1995). PGP: Pretty Good Privacy. Sebastopol: O\u2019Reilly Media, Inc."},{"key":"620_CR23","doi-asserted-by":"publisher","unstructured":"Gregor, S., & Hevner, A. R. (2013). Positioning and presenting design science research for maximum impact. MIS Quarterly, 37(2), 337\u2013355. https:\/\/doi.org\/10.25300\/MISQ\/2013\/37.2.01.","DOI":"10.25300\/MISQ\/2013\/37.2.01"},{"key":"620_CR24","doi-asserted-by":"publisher","unstructured":"Guggenberger, T., Schweizer, A., & Urbach, N. (2020). Improving interorganizational information sharing for vendor managed inventory: Toward a decentralized information hub using blockchain technology. IEEE Transactions on Engineering Management, 67(4), 1074\u20131085. https:\/\/doi.org\/10.1109\/TEM.2020.2978628","DOI":"10.1109\/TEM.2020.2978628"},{"key":"620_CR25","doi-asserted-by":"publisher","unstructured":"Haddouti, S. E., & Ech-Cherif El Kettani, M. D. (2019). Analysis of identity management systems using blockchain technology. International Conference on Advanced Communication Technologies and Networking (CommNet), 1\u20137. https:\/\/doi.org\/10.1109\/COMMNET.2019.8742375.","DOI":"10.1109\/COMMNET.2019.8742375"},{"key":"620_CR26","unstructured":"Hyperledger Aries. (2020). hyperledger\/aries, available at https:\/\/github.com\/hyperledger\/aries. Accessed 27 Dec\u00a02022."},{"key":"620_CR27","unstructured":"Hyperledger Indy. (2020). hyperledger\/indy-sdk, available at https:\/\/github.com\/hyperledger\/indy-sdk. Accessed 27 Dec\u00a02022."},{"key":"620_CR28","doi-asserted-by":"publisher","unstructured":"Jensen, J. (2012). Federated identity management challenges. 2012 Seventh International Conference on Availability, Reliability and Security, Prague, TBD, Czech Republic, IEEE, 230\u2013235. https:\/\/doi.org\/10.1109\/ARES.2012.68.","DOI":"10.1109\/ARES.2012.68"},{"key":"620_CR29","doi-asserted-by":"publisher","unstructured":"Lesavre, L. (2020). A taxonomic approach to understanding emerging blockchain identity management systems [White paper]. National Institute of Standards and Technology, p. 62. https:\/\/doi.org\/10.6028\/NIST.CSWP.01142020.","DOI":"10.6028\/NIST.CSWP.01142020"},{"key":"620_CR30","doi-asserted-by":"publisher","first-page":"102731","DOI":"10.1016\/j.jnca.2020.102731","volume":"166","author":"Y Liu","year":"2020","unstructured":"Liu, Y., He, D., Obaidat, M. S., Kumar, N., Khan, M. K., & Choo, K.-K.R. (2020). Blockchain-based identity management systems: A review. Journal of Network and Computer Applications, 166, 102731. https:\/\/doi.org\/10.1016\/j.jnca.2020.102731","journal-title":"Journal of Network and Computer Applications"},{"issue":"4","key":"620_CR31","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/0167-9236(94)00041-2","volume":"15","author":"ST March","year":"1995","unstructured":"March, S. T., & Smith, G. F. (1995). Design and natural science research on information technology. Decision Support Systems, 15(4), 251\u2013266. https:\/\/doi.org\/10.1016\/0167-9236(94)00041-2","journal-title":"Decision Support Systems"},{"key":"620_CR32","doi-asserted-by":"publisher","unstructured":"March, S. T., & Storey, V. C. (2008). Design science in the information systems discipline: An introduction to the special issue on design science research. MIS Quarterly, 725\u2013730. https:\/\/doi.org\/10.2307\/25148869","DOI":"10.2307\/25148869"},{"key":"620_CR33","doi-asserted-by":"publisher","unstructured":"Marina, N., Taskov, P., & Karamachoski J. (2020). Blockchain-based application for certification management. Tehni\u010dki Glasnik, 14(4), 488\u2013492.\u00a0https:\/\/doi.org\/10.31803\/tg-20200811113729","DOI":"10.31803\/tg-20200811113729"},{"key":"620_CR34","unstructured":"Mayring, P. (2014). Qualitative content analysis: Theoretical foundation, basic procedures and software solution, Klagenfurt, Austria, available at https:\/\/nbn-resolving.org\/urn:nbn:de:0168-ssoar-395173. Accessed 12 Dec\u00a02022."},{"key":"620_CR35","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.cosrev.2018.10.002","volume":"30","author":"A M\u00fchle","year":"2018","unstructured":"M\u00fchle, A., Gr\u00fcner, A., Gayvoronskaya, T., & Meinel, C. (2018). A survey on essential components of a self-sovereign identity. Computer Science Review, 30, 80\u201386. https:\/\/doi.org\/10.1016\/j.cosrev.2018.10.002","journal-title":"Computer Science Review"},{"key":"620_CR36","unstructured":"N\u00e6rland, K., M\u00fcller-Bloch, C., Beck, R., & Palmund, S. (2017). Blockchain to rule the waves - Nascent design principles for reducing risk and uncertainty in decentralized environments. Proceedings of the International Conference on Information Systems (ICIS).\u00a0http:\/\/aisel.aisnet.org\/icis2017\/HCI\/Presentations\/12\/"},{"key":"620_CR37","unstructured":"Nauta, J., & Joosten, R. (2019). Self-Sovereign Identity: A comparison of IRMA and Sovrin, available at https:\/\/publications.tno.nl\/publication\/34634504\/uwmOQq\/TNO-2019-R11011.pdf. Accessed 12 Dec\u00a02022."},{"key":"620_CR38","doi-asserted-by":"publisher","unstructured":"Nunamaker, Jr., J., F., Minder, C., & Titus, D., P. (1990). Systems development in information systems research. Journal of management information systems, 89\u2013106. https:\/\/doi.org\/10.1080\/07421222.1990.11517898","DOI":"10.1080\/07421222.1990.11517898"},{"key":"620_CR39","doi-asserted-by":"publisher","unstructured":"P\u00e1ez, R., P\u00e9rez, M., Ramirez, G., Montes, J., & Bouvarel, L. (2020). An architecture for biometric electronic identification document system based on blockchain. Future Internet, 12(1), 10. https:\/\/doi.org\/10.3390\/fi12010010","DOI":"10.3390\/fi12010010"},{"key":"620_CR40","doi-asserted-by":"publisher","unstructured":"Peffers, K., Tuunanen, T., Rothenberger, M. A., & Chatterjee, S. (2007). A design science research methodology for information systems research. Journal of Management Information Systems, 24(3), 45\u201377. https:\/\/doi.org\/10.2753\/MIS0742-1222240302","DOI":"10.2753\/MIS0742-1222240302"},{"key":"620_CR41","unstructured":"Preukschat, A. & Reed, D. (2021). Self-Sovereign Identity: Decentralized digital identity and verifiable credentials. Shelter Island: Manning\nPublications"},{"key":"620_CR42","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2021.03.005","author":"T Rathee","year":"2021","unstructured":"Rathee, T., & Singh, P. (2021). A systematic literature mapping on secure identity management using blockchain technology. Journal of King Saud University - Computer and Information Sciences. https:\/\/doi.org\/10.1016\/j.jksuci.2021.03.005","journal-title":"Journal of King Saud University - Computer and Information Sciences"},{"key":"620_CR43","doi-asserted-by":"publisher","unstructured":"Rhie, M.-H., Kim, K.-H., Hwang, D., & Kim, K.-H. (2021). Vulnerability analysis of DID Document\u2019s updating process in the decentralized identifier systems. 2021 International Conference on Information Networking (ICOIN), 517\u2013520. https:\/\/doi.org\/10.1109\/ICOIN50884.2021.9334011.","DOI":"10.1109\/ICOIN50884.2021.9334011"},{"key":"620_CR44","doi-asserted-by":"publisher","unstructured":"Rieger, A., Guggenmos, F., Lockl, J., Fridgen, G., & Urbach, N. (2019). Building a blockchain application that complies with the EU General Data Protection Regulation. MIS Quarterly Executive, 18(4), 263\u2013279. https:\/\/doi.org\/10.17705\/2msqe.00020.","DOI":"10.17705\/2msqe.00020"},{"key":"620_CR45","unstructured":"Solove, D. J. (2012). Introduction: Privacy self-management and the consent dilemma. Harvard Law Review, 126, 1880."},{"key":"620_CR46","unstructured":"Sourabh, W. (2019). Decentralized digital identity management using blockchain and its implication on public sector, available at https:\/\/www.semanticscholar.org\/paper\/Decentralized-digital-identity-management-using-and-Wadhwa\/9b6e9bd362dfa6182e833358c34b2ec60cf170cd. Accessed 26 Jul\u00a02022."},{"key":"620_CR47","doi-asserted-by":"publisher","unstructured":"Squicciarini, A. C., Czeskis, A., & Bhargav-Spantzel, A. (2008). Privacy policies compliance across digital identity management systems. In\u00a0Bertino, E., & Damiani, M. L. (Eds.),\u00a0Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS\u00a0(pp. 72\u201381). Irvine California. 04 11 2008 04 11 2008. New York: ACM. https:\/\/doi.org\/10.1145\/1503402.1503416","DOI":"10.1145\/1503402.1503416"},{"issue":"4","key":"620_CR48","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1016\/j.clsr.2017.03.016","volume":"33","author":"C Sullivan","year":"2017","unstructured":"Sullivan, C., & Burger, E. (2017). E-residency and blockchain. Computer Law & Security Review, 33(4), 470\u2013481. https:\/\/doi.org\/10.1016\/j.clsr.2017.03.016","journal-title":"Computer Law & Security Review"},{"key":"620_CR49","volume-title":"Business transformation through blockchain","year":"2019","unstructured":"Treiblmaier, H., & Beck, R. (Eds.). (2019). Business transformation through blockchain. Springer International Publishing."},{"key":"620_CR50","unstructured":"van Bokkem, D., Hageman, R., Koning, G., Nguyen, L., & Zarin, N. (2019). Self-Sovereign identity solutions: The Necessity of blockchain technology. arXiv preprint. https:\/\/arxiv.org\/abs\/1904.12816"},{"key":"620_CR51","unstructured":"W3C. (2021a). Decentralized Identifiers (DIDs) v1.0, available at https:\/\/www.w3.org\/TR\/did-core\/. Accessed 24 Apr\u00a02022."},{"key":"620_CR52","unstructured":"W3C. (2021b). Verifiable Credentials Data Model 1.0, available at https:\/\/www.w3.org\/TR\/vc-data-model\/. Accessed 24 Apr\u00a02022."},{"key":"620_CR53","doi-asserted-by":"publisher","unstructured":"Wang, F., & Filippi, P. de. (2020). Self-sovereign identity in a globalized world: Credentials-based identity systems as a driver for economic inclusion. Frontiers in Blockchain, 2. https:\/\/doi.org\/10.3389\/fbloc.2019.00028","DOI":"10.3389\/fbloc.2019.00028"},{"key":"620_CR54","unstructured":"Whitman, M. E., & Mattord, H. J. (2011). Principles of information security.\u00a0Boston: Course Technology Press."},{"key":"620_CR55","doi-asserted-by":"publisher","unstructured":"Williams, I. (2020). Cross-chain blockchain networks, compatibility standards, and interoperability standards: The case of European blockchain services infrastructure. Cross-Industry Use of Blockchain Technology and Opportunities for the Future (pp. 150\u2013165). IGI global. https:\/\/doi.org\/10.4018\/978-1-7998-3632-2.ch010","DOI":"10.4018\/978-1-7998-3632-2.ch010"},{"key":"620_CR56","doi-asserted-by":"publisher","unstructured":"Yavuz, E., Koc, A. K., Cabuk, U. C., & Dalkilic, G. (2018). Towards secure e-voting using ethereum blockchain. 2018 6th International Symposium on Digital Forensic and Security (ISDFS), Antalya. 2018, IEEE, 1\u20137. https:\/\/doi.org\/10.1109\/ISDFS.2018.8355340","DOI":"10.1109\/ISDFS.2018.8355340"},{"key":"620_CR57","doi-asserted-by":"crossref","unstructured":"Zambrano, R., Young, A., & Verhulst, S. (2018). Connecting refugees to aid through blockchain-enabled ID management: World Food Programme\u2019s building blocks. GovLab October, available at https:\/\/www.irisguard.com\/media\/laglvgzk\/building-blocks-case-study.pdf. Accessed 12 Dec\u00a02022.","DOI":"10.1093\/oso\/9780198833765.003.0002"},{"key":"620_CR58","doi-asserted-by":"publisher","unstructured":"Zhu, X., & Badr, Y. (2018). A Survey on blockchain-based identity management systems for the Internet of Things. IEEE International Conference, 1568\u20131573. https:\/\/doi.org\/10.1109\/Cybermatics_2018.2018.00263","DOI":"10.1109\/Cybermatics_2018.2018.00263"}],"container-title":["Electronic Markets"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12525-023-00620-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12525-023-00620-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12525-023-00620-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,20]],"date-time":"2023-12-20T08:13:23Z","timestamp":1703060003000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12525-023-00620-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,15]]},"references-count":58,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["620"],"URL":"https:\/\/doi.org\/10.1007\/s12525-023-00620-z","relation":{},"ISSN":["1019-6781","1422-8890"],"issn-type":[{"value":"1019-6781","type":"print"},{"value":"1422-8890","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,15]]},"assertion":[{"value":"23 January 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 February 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 April 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"3"}}