Securing financial systems through data sovereignty: a systematic review of approaches and regulations Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.1007/s10207-025-01074-4
The growing complexity of global financial systems, combined with the digital transformation driven by AI and decentralized technologies, has increased vulnerabilities in data security, privacy, and regulatory compliance. These challenges are particularly dire in the financial sector, where institutions must not only safeguard sensitive financial data but also comply with diverse national and international regulatory frameworks. This study aims to investigate existing approaches for securing financial systems through machine learning, legal frameworks, and regulations, while also highlighting strategies based on decentralization. The review is conducted through the database searches of relevant literature in IEEE Xplore, ACM, ScienceDirect, Springer, and Web of Science. The search covers journals and conferences from 2014 to 2024. Studies not in English and those not addressing the security of financial systems through data sovereignty are excluded. We adopted PRISMA for selecting the final papers for analysis. A total of 741 studies were identified and narrowed down to 52 studies. Following a comprehensive analysis of the legal frameworks and regulatory measures pertaining to artificial intelligence (AI) across various nations and regions, it emerges that the European Union (EU) is at the forefront in this domain. Our in-depth research reveals significant variations in the methodologies employed by different countries to regulate AI and maintain sovereignty over financial data. Of the 13 data sovereignty methods examined, only five explicitly address security concerns, which are viewed as the most important component. Research highlights the challenges of protecting financial systems through data sovereignty in an increasingly digital economy. Although regulatory frameworks, particularly in the EU, have made significant progress in addressing AI-related risks in banking, challenges remain in balancing innovation with regulatory compliance across jurisdictions. The research emphasizes that while AI and machine learning technologies offer significant potential for enhancing financial security, they must operate within robust, harmonized regulatory frameworks to address issues of trust, privacy, and autonomy. Future research should focus on harmonizing global regulatory efforts and exploring ethical considerations to ensure financial systems remain secure, compliant, and inclusive.
Related Topics
- Type
- review
- Language
- en
- Landing Page
- https://doi.org/10.1007/s10207-025-01074-4
- https://link.springer.com/content/pdf/10.1007/s10207-025-01074-4.pdf
- OA Status
- hybrid
- References
- 59
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4411372041
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4411372041Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1007/s10207-025-01074-4Digital Object Identifier
- Title
-
Securing financial systems through data sovereignty: a systematic review of approaches and regulationsWork title
- Type
-
reviewOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-06-17Full publication date if available
- Authors
-
Aditya Patil, Biswajeeban Mishra, Sabarathinam Chockalingam, Sanjay Misra, Petter KvalvikList of authors in order
- Landing page
-
https://doi.org/10.1007/s10207-025-01074-4Publisher landing page
- PDF URL
-
https://link.springer.com/content/pdf/10.1007/s10207-025-01074-4.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
hybridOpen access status per OpenAlex
- OA URL
-
https://link.springer.com/content/pdf/10.1007/s10207-025-01074-4.pdfDirect OA link when available
- Concepts
-
Computer science, Sovereignty, Cryptography, Computer security, Data science, Political science, Politics, LawTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
59Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4411372041 |
|---|---|
| doi | https://doi.org/10.1007/s10207-025-01074-4 |
| ids.doi | https://doi.org/10.1007/s10207-025-01074-4 |
| ids.openalex | https://openalex.org/W4411372041 |
| fwci | 0.0 |
| type | review |
| title | Securing financial systems through data sovereignty: a systematic review of approaches and regulations |
| biblio.issue | 4 |
| biblio.volume | 24 |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T10270 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9948999881744385 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1710 |
| topics[0].subfield.display_name | Information Systems |
| topics[0].display_name | Blockchain Technology Applications and Security |
| topics[1].id | https://openalex.org/T12519 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9140999913215637 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1710 |
| topics[1].subfield.display_name | Information Systems |
| topics[1].display_name | Cybercrime and Law Enforcement Studies |
| is_xpac | False |
| apc_list.value | 2590 |
| apc_list.currency | EUR |
| apc_list.value_usd | 3190 |
| apc_paid.value | 2590 |
| apc_paid.currency | EUR |
| apc_paid.value_usd | 3190 |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.5908774137496948 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C186229450 |
| concepts[1].level | 3 |
| concepts[1].score | 0.5557154417037964 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q42008 |
| concepts[1].display_name | Sovereignty |
| concepts[2].id | https://openalex.org/C178489894 |
| concepts[2].level | 2 |
| concepts[2].score | 0.5513078570365906 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q8789 |
| concepts[2].display_name | Cryptography |
| concepts[3].id | https://openalex.org/C38652104 |
| concepts[3].level | 1 |
| concepts[3].score | 0.4638424515724182 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[3].display_name | Computer security |
| concepts[4].id | https://openalex.org/C2522767166 |
| concepts[4].level | 1 |
| concepts[4].score | 0.34922492504119873 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q2374463 |
| concepts[4].display_name | Data science |
| concepts[5].id | https://openalex.org/C17744445 |
| concepts[5].level | 0 |
| concepts[5].score | 0.21274957060813904 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q36442 |
| concepts[5].display_name | Political science |
| concepts[6].id | https://openalex.org/C94625758 |
| concepts[6].level | 2 |
| concepts[6].score | 0.1243600845336914 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q7163 |
| concepts[6].display_name | Politics |
| concepts[7].id | https://openalex.org/C199539241 |
| concepts[7].level | 1 |
| concepts[7].score | 0.11480683088302612 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q7748 |
| concepts[7].display_name | Law |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.5908774137496948 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/sovereignty |
| keywords[1].score | 0.5557154417037964 |
| keywords[1].display_name | Sovereignty |
| keywords[2].id | https://openalex.org/keywords/cryptography |
| keywords[2].score | 0.5513078570365906 |
| keywords[2].display_name | Cryptography |
| keywords[3].id | https://openalex.org/keywords/computer-security |
| keywords[3].score | 0.4638424515724182 |
| keywords[3].display_name | Computer security |
| keywords[4].id | https://openalex.org/keywords/data-science |
| keywords[4].score | 0.34922492504119873 |
| keywords[4].display_name | Data science |
| keywords[5].id | https://openalex.org/keywords/political-science |
| keywords[5].score | 0.21274957060813904 |
| keywords[5].display_name | Political science |
| keywords[6].id | https://openalex.org/keywords/politics |
| keywords[6].score | 0.1243600845336914 |
| keywords[6].display_name | Politics |
| keywords[7].id | https://openalex.org/keywords/law |
| keywords[7].score | 0.11480683088302612 |
| keywords[7].display_name | Law |
| language | en |
| locations[0].id | doi:10.1007/s10207-025-01074-4 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S164062316 |
| locations[0].source.issn | 1615-5262, 1615-5270 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 1615-5262 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | International Journal of Information Security |
| locations[0].source.host_organization | https://openalex.org/P4310319900 |
| locations[0].source.host_organization_name | Springer Science+Business Media |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319900, https://openalex.org/P4310319965 |
| locations[0].source.host_organization_lineage_names | Springer Science+Business Media, Springer Nature |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://link.springer.com/content/pdf/10.1007/s10207-025-01074-4.pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | International Journal of Information Security |
| locations[0].landing_page_url | https://doi.org/10.1007/s10207-025-01074-4 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5114053359 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | Aditya Patil |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Ayush Patil |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5022126709 |
| authorships[1].author.orcid | https://orcid.org/0000-0003-2624-1905 |
| authorships[1].author.display_name | Biswajeeban Mishra |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Biswajeeban Mishra |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5021161855 |
| authorships[2].author.orcid | https://orcid.org/0000-0001-6003-2360 |
| authorships[2].author.display_name | Sabarathinam Chockalingam |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Sabarathinam Chockalingam |
| authorships[2].is_corresponding | False |
| authorships[3].author.id | https://openalex.org/A5064136287 |
| authorships[3].author.orcid | https://orcid.org/0000-0002-3556-9331 |
| authorships[3].author.display_name | Sanjay Misra |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Sanjay Misra |
| authorships[3].is_corresponding | False |
| authorships[4].author.id | https://openalex.org/A5073961106 |
| authorships[4].author.orcid | https://orcid.org/0000-0002-4913-5374 |
| authorships[4].author.display_name | Petter Kvalvik |
| authorships[4].author_position | last |
| authorships[4].raw_author_name | Petter Kvalvik |
| authorships[4].is_corresponding | False |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://link.springer.com/content/pdf/10.1007/s10207-025-01074-4.pdf |
| open_access.oa_status | hybrid |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Securing financial systems through data sovereignty: a systematic review of approaches and regulations |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10270 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9948999881744385 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1710 |
| primary_topic.subfield.display_name | Information Systems |
| primary_topic.display_name | Blockchain Technology Applications and Security |
| related_works | https://openalex.org/W4391375266, https://openalex.org/W2899084033, https://openalex.org/W2748952813, https://openalex.org/W2386120673, https://openalex.org/W3161231360, https://openalex.org/W3084369711, https://openalex.org/W2600324592, https://openalex.org/W3121858519, https://openalex.org/W2060145807, https://openalex.org/W4248806346 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.1007/s10207-025-01074-4 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S164062316 |
| best_oa_location.source.issn | 1615-5262, 1615-5270 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 1615-5262 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | International Journal of Information Security |
| best_oa_location.source.host_organization | https://openalex.org/P4310319900 |
| best_oa_location.source.host_organization_name | Springer Science+Business Media |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310319900, https://openalex.org/P4310319965 |
| best_oa_location.source.host_organization_lineage_names | Springer Science+Business Media, Springer Nature |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://link.springer.com/content/pdf/10.1007/s10207-025-01074-4.pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | International Journal of Information Security |
| best_oa_location.landing_page_url | https://doi.org/10.1007/s10207-025-01074-4 |
| primary_location.id | doi:10.1007/s10207-025-01074-4 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S164062316 |
| primary_location.source.issn | 1615-5262, 1615-5270 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 1615-5262 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | International Journal of Information Security |
| primary_location.source.host_organization | https://openalex.org/P4310319900 |
| primary_location.source.host_organization_name | Springer Science+Business Media |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319900, https://openalex.org/P4310319965 |
| primary_location.source.host_organization_lineage_names | Springer Science+Business Media, Springer Nature |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://link.springer.com/content/pdf/10.1007/s10207-025-01074-4.pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | International Journal of Information Security |
| primary_location.landing_page_url | https://doi.org/10.1007/s10207-025-01074-4 |
| publication_date | 2025-06-17 |
| publication_year | 2025 |
| referenced_works | https://openalex.org/W1701912282, https://openalex.org/W4241491610, https://openalex.org/W4392561702, https://openalex.org/W4312963303, https://openalex.org/W4393965397, https://openalex.org/W4220959902, https://openalex.org/W4391871104, https://openalex.org/W4307751500, https://openalex.org/W3036862791, https://openalex.org/W2901406244, https://openalex.org/W7005731672, https://openalex.org/W4226192937, https://openalex.org/W4388087118, https://openalex.org/W4396232966, https://openalex.org/W4399201829, https://openalex.org/W1980710855, https://openalex.org/W4294215472, https://openalex.org/W4401431356, https://openalex.org/W3121307771, https://openalex.org/W2748991575, https://openalex.org/W4386066761, https://openalex.org/W3088026283, https://openalex.org/W3028742364, https://openalex.org/W4312250838, https://openalex.org/W4376608940, https://openalex.org/W4205581229, https://openalex.org/W2964413836, https://openalex.org/W4297666415, https://openalex.org/W4381394563, https://openalex.org/W4391914813, https://openalex.org/W4401011704, https://openalex.org/W4244967411, https://openalex.org/W4385011995, https://openalex.org/W4388983174, https://openalex.org/W4396854118, https://openalex.org/W3173970477, https://openalex.org/W3198402690, https://openalex.org/W4400310015, https://openalex.org/W4312304097, https://openalex.org/W4387851054, https://openalex.org/W4393904857, https://openalex.org/W4385315120, https://openalex.org/W4401052850, https://openalex.org/W2986222069, https://openalex.org/W3178572324, https://openalex.org/W2534384756, https://openalex.org/W4399038350, https://openalex.org/W4399854093, https://openalex.org/W4391696703, https://openalex.org/W4396788545, https://openalex.org/W4285261180, https://openalex.org/W4286539379, https://openalex.org/W3206437044, https://openalex.org/W4405307101, https://openalex.org/W4399146200, https://openalex.org/W3178440280, https://openalex.org/W4402863565, https://openalex.org/W3016512116, https://openalex.org/W6960181122 |
| referenced_works_count | 59 |
| abstract_inverted_index.A | 141 |
| abstract_inverted_index.a | 155 |
| abstract_inverted_index.13 | 213 |
| abstract_inverted_index.52 | 152 |
| abstract_inverted_index.AI | 15, 204, 280 |
| abstract_inverted_index.Of | 211 |
| abstract_inverted_index.We | 131 |
| abstract_inverted_index.an | 244 |
| abstract_inverted_index.as | 227 |
| abstract_inverted_index.at | 183 |
| abstract_inverted_index.by | 14, 199 |
| abstract_inverted_index.in | 22, 34, 93, 115, 186, 195, 243, 252, 259, 263, 267 |
| abstract_inverted_index.is | 84, 182 |
| abstract_inverted_index.it | 175 |
| abstract_inverted_index.of | 4, 90, 101, 123, 143, 158, 236, 303 |
| abstract_inverted_index.on | 80, 312 |
| abstract_inverted_index.to | 60, 111, 151, 166, 202, 300, 321 |
| abstract_inverted_index.741 | 144 |
| abstract_inverted_index.EU, | 254 |
| abstract_inverted_index.Our | 189 |
| abstract_inverted_index.The | 1, 82, 103, 275 |
| abstract_inverted_index.Web | 100 |
| abstract_inverted_index.and | 16, 26, 53, 73, 99, 107, 117, 148, 162, 173, 205, 281, 306, 317, 328 |
| abstract_inverted_index.are | 31, 129, 225 |
| abstract_inverted_index.but | 47 |
| abstract_inverted_index.for | 64, 134, 139, 288 |
| abstract_inverted_index.has | 19 |
| abstract_inverted_index.not | 41, 114, 119 |
| abstract_inverted_index.the | 10, 35, 87, 121, 136, 159, 178, 184, 196, 212, 228, 234, 253 |
| abstract_inverted_index.(AI) | 169 |
| abstract_inverted_index.(EU) | 181 |
| abstract_inverted_index.2014 | 110 |
| abstract_inverted_index.ACM, | 96 |
| abstract_inverted_index.IEEE | 94 |
| abstract_inverted_index.This | 57 |
| abstract_inverted_index.aims | 59 |
| abstract_inverted_index.also | 48, 76 |
| abstract_inverted_index.data | 23, 46, 127, 214, 241 |
| abstract_inverted_index.dire | 33 |
| abstract_inverted_index.down | 150 |
| abstract_inverted_index.five | 219 |
| abstract_inverted_index.from | 109 |
| abstract_inverted_index.have | 255 |
| abstract_inverted_index.made | 256 |
| abstract_inverted_index.most | 229 |
| abstract_inverted_index.must | 40, 293 |
| abstract_inverted_index.only | 42, 218 |
| abstract_inverted_index.over | 208 |
| abstract_inverted_index.that | 177, 278 |
| abstract_inverted_index.they | 292 |
| abstract_inverted_index.this | 187 |
| abstract_inverted_index.were | 146 |
| abstract_inverted_index.with | 9, 50, 270 |
| abstract_inverted_index.2024. | 112 |
| abstract_inverted_index.These | 29 |
| abstract_inverted_index.Union | 180 |
| abstract_inverted_index.based | 79 |
| abstract_inverted_index.data. | 210 |
| abstract_inverted_index.final | 137 |
| abstract_inverted_index.focus | 311 |
| abstract_inverted_index.legal | 71, 160 |
| abstract_inverted_index.offer | 285 |
| abstract_inverted_index.risks | 262 |
| abstract_inverted_index.study | 58 |
| abstract_inverted_index.those | 118 |
| abstract_inverted_index.total | 142 |
| abstract_inverted_index.where | 38 |
| abstract_inverted_index.which | 224 |
| abstract_inverted_index.while | 75, 279 |
| abstract_inverted_index.Future | 308 |
| abstract_inverted_index.PRISMA | 133 |
| abstract_inverted_index.across | 170, 273 |
| abstract_inverted_index.comply | 49 |
| abstract_inverted_index.covers | 105 |
| abstract_inverted_index.driven | 13 |
| abstract_inverted_index.ensure | 322 |
| abstract_inverted_index.global | 5, 314 |
| abstract_inverted_index.issues | 302 |
| abstract_inverted_index.papers | 138 |
| abstract_inverted_index.remain | 266, 325 |
| abstract_inverted_index.review | 83 |
| abstract_inverted_index.search | 104 |
| abstract_inverted_index.should | 310 |
| abstract_inverted_index.trust, | 304 |
| abstract_inverted_index.viewed | 226 |
| abstract_inverted_index.within | 295 |
| abstract_inverted_index.English | 116 |
| abstract_inverted_index.Studies | 113 |
| abstract_inverted_index.Xplore, | 95 |
| abstract_inverted_index.address | 221, 301 |
| abstract_inverted_index.adopted | 132 |
| abstract_inverted_index.digital | 11, 246 |
| abstract_inverted_index.diverse | 51 |
| abstract_inverted_index.domain. | 188 |
| abstract_inverted_index.efforts | 316 |
| abstract_inverted_index.emerges | 176 |
| abstract_inverted_index.ethical | 319 |
| abstract_inverted_index.growing | 2 |
| abstract_inverted_index.machine | 69, 282 |
| abstract_inverted_index.methods | 216 |
| abstract_inverted_index.nations | 172 |
| abstract_inverted_index.operate | 294 |
| abstract_inverted_index.reveals | 192 |
| abstract_inverted_index.robust, | 296 |
| abstract_inverted_index.sector, | 37 |
| abstract_inverted_index.secure, | 326 |
| abstract_inverted_index.studies | 145 |
| abstract_inverted_index.systems | 67, 125, 239, 324 |
| abstract_inverted_index.through | 68, 86, 126, 240 |
| abstract_inverted_index.various | 171 |
| abstract_inverted_index.Abstract | 0 |
| abstract_inverted_index.Although | 248 |
| abstract_inverted_index.European | 179 |
| abstract_inverted_index.Research | 232 |
| abstract_inverted_index.Science. | 102 |
| abstract_inverted_index.analysis | 157 |
| abstract_inverted_index.banking, | 264 |
| abstract_inverted_index.combined | 8 |
| abstract_inverted_index.database | 88 |
| abstract_inverted_index.economy. | 247 |
| abstract_inverted_index.employed | 198 |
| abstract_inverted_index.existing | 62 |
| abstract_inverted_index.in-depth | 190 |
| abstract_inverted_index.journals | 106 |
| abstract_inverted_index.learning | 283 |
| abstract_inverted_index.maintain | 206 |
| abstract_inverted_index.measures | 164 |
| abstract_inverted_index.narrowed | 149 |
| abstract_inverted_index.national | 52 |
| abstract_inverted_index.privacy, | 25, 305 |
| abstract_inverted_index.progress | 258 |
| abstract_inverted_index.regions, | 174 |
| abstract_inverted_index.regulate | 203 |
| abstract_inverted_index.relevant | 91 |
| abstract_inverted_index.research | 191, 276, 309 |
| abstract_inverted_index.searches | 89 |
| abstract_inverted_index.securing | 65 |
| abstract_inverted_index.security | 122, 222 |
| abstract_inverted_index.studies. | 153 |
| abstract_inverted_index.systems, | 7 |
| abstract_inverted_index.Following | 154 |
| abstract_inverted_index.Springer, | 98 |
| abstract_inverted_index.analysis. | 140 |
| abstract_inverted_index.autonomy. | 307 |
| abstract_inverted_index.balancing | 268 |
| abstract_inverted_index.concerns, | 223 |
| abstract_inverted_index.conducted | 85 |
| abstract_inverted_index.countries | 201 |
| abstract_inverted_index.different | 200 |
| abstract_inverted_index.enhancing | 289 |
| abstract_inverted_index.examined, | 217 |
| abstract_inverted_index.excluded. | 130 |
| abstract_inverted_index.exploring | 318 |
| abstract_inverted_index.financial | 6, 36, 45, 66, 124, 209, 238, 290, 323 |
| abstract_inverted_index.forefront | 185 |
| abstract_inverted_index.important | 230 |
| abstract_inverted_index.increased | 20 |
| abstract_inverted_index.learning, | 70 |
| abstract_inverted_index.potential | 287 |
| abstract_inverted_index.safeguard | 43 |
| abstract_inverted_index.security, | 24, 291 |
| abstract_inverted_index.selecting | 135 |
| abstract_inverted_index.sensitive | 44 |
| abstract_inverted_index.AI-related | 261 |
| abstract_inverted_index.addressing | 120, 260 |
| abstract_inverted_index.approaches | 63 |
| abstract_inverted_index.artificial | 167 |
| abstract_inverted_index.challenges | 30, 235, 265 |
| abstract_inverted_index.complexity | 3 |
| abstract_inverted_index.compliance | 272 |
| abstract_inverted_index.compliant, | 327 |
| abstract_inverted_index.component. | 231 |
| abstract_inverted_index.emphasizes | 277 |
| abstract_inverted_index.explicitly | 220 |
| abstract_inverted_index.frameworks | 161, 299 |
| abstract_inverted_index.harmonized | 297 |
| abstract_inverted_index.highlights | 233 |
| abstract_inverted_index.identified | 147 |
| abstract_inverted_index.inclusive. | 329 |
| abstract_inverted_index.innovation | 269 |
| abstract_inverted_index.literature | 92 |
| abstract_inverted_index.pertaining | 165 |
| abstract_inverted_index.protecting | 237 |
| abstract_inverted_index.regulatory | 27, 55, 163, 249, 271, 298, 315 |
| abstract_inverted_index.strategies | 78 |
| abstract_inverted_index.variations | 194 |
| abstract_inverted_index.compliance. | 28 |
| abstract_inverted_index.conferences | 108 |
| abstract_inverted_index.frameworks, | 72, 250 |
| abstract_inverted_index.frameworks. | 56 |
| abstract_inverted_index.harmonizing | 313 |
| abstract_inverted_index.investigate | 61 |
| abstract_inverted_index.significant | 193, 257, 286 |
| abstract_inverted_index.sovereignty | 128, 207, 215, 242 |
| abstract_inverted_index.highlighting | 77 |
| abstract_inverted_index.increasingly | 245 |
| abstract_inverted_index.institutions | 39 |
| abstract_inverted_index.intelligence | 168 |
| abstract_inverted_index.particularly | 32, 251 |
| abstract_inverted_index.regulations, | 74 |
| abstract_inverted_index.technologies | 284 |
| abstract_inverted_index.comprehensive | 156 |
| abstract_inverted_index.decentralized | 17 |
| abstract_inverted_index.international | 54 |
| abstract_inverted_index.methodologies | 197 |
| abstract_inverted_index.technologies, | 18 |
| abstract_inverted_index.ScienceDirect, | 97 |
| abstract_inverted_index.considerations | 320 |
| abstract_inverted_index.jurisdictions. | 274 |
| abstract_inverted_index.transformation | 12 |
| abstract_inverted_index.vulnerabilities | 21 |
| abstract_inverted_index.decentralization. | 81 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 5 |
| citation_normalized_percentile.value | 0.29860527 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |