APTISI Transactions on Technopreneurship (ATT) Vol. No. July 2024, pp. 169Oe181 E-ISSN: 2656-8888 | P-ISSN: 2655-8807. DOI:10. ye Comparative Analysis of NIJ and NIST Methods for MicroSD Investigations: A Technopreneur Approach Nizirwan Anwar1* . Agung Mulyo Widodo2 . Binastya Anggara Sekti3 Mosiur Rahaman5 . Hani Dewi Ariessanti 6 . Muhamad Bahrul Ulum4 1 Dept. of Informatics Engineering. Esa Unggul University. Indonesia 2,4,6 Dept. of Computer Science. Esa Unggul University. Indonesia 3 Dept. of Information System. Esa Unggul University. Indonesia 5 Dept. of International Center for AI and Cyber Security Research and Innovations (ICCRI). Asia University. Taiwan 1 nizirwan. anwar@esaunggul. id, 2 agung. mulyo@esaunggul. id, 3 anggara@esaunggul. id, 4 m. bahrul ulum@esaunggul. 5 mosiurrahaman@asia. tw, 6 hani. dewi@esaunggul. *Corresponding Author Article Info ABSTRACT Article history: This research aims to compare the performance of two forensic investigation methods, the National Institute of Justice (NIJ) and the National Institute of Standards and Technology (NIST), specifically for evidence analysis of MicroSD cards. MicroSD cards are frequently used as external storage in various digital devices, making them critical in digital forensic investigations. The study evaluates the effectiveness of these methods using tools such as Access Data FTK Imager and autopsy. The NIJ method enthis comparative passes detailed stages of preparation, collection, examination, analysis, and reporting, while the NIST method includes stages of collection, examination, analysis, and Results indicate that the NIJ method provides more comprehensive and detailed results, while the NIST method offers a faster investigation process. Additionally, tables and graphs illustrating performance metrics are included to substantiate the findings. This comparative analysis provides valuable insights for technopreneurs in optimizing digital forensic methods for better data integrity and efficiency, ultimately enhancing decision-making processes in technological entrepreneurship. Furthermore, this study aligns with the United NationsAo Sustainable Development Goals (SDG. , particularly Goal 9: Industry. Innovation, and Infrastructure, by promoting innovative forensic methods that support the development of resilient infrastructure and foster innovation in the digital age. This study highlights the importance of effective forensic methods in supporting technopreneurial ventures. Submission May 07, 2024 Revised June 24, 2024 Accepted July 01, 2024 Published July 11, 2024 Keywords: Digital Forensics National Institute of Justice (NIJ) National Institute of Standards and Technology (NIST) MicroSD Technopreneurship This is an open access article under the CC BY 4. 0 license. *Corresponding Author: Nizirwan Anwar . anwar@esaunggul. DOI: https://doi. org/10. 34306/att. This is an open-access article under the CC-BY license . ttps://creativecommons. org/licenses/by/4. AAuthors retain all copyrights INTRODUCTION Digital developments in the modern era are occurring very rapidly in society, facilitated by the widespread use of digital devices. These developments have significantly impacted various fields, including forensics. Journal homepage: https://att. id/index. php/att ye E-ISSN: 2656-8888 | P-ISSN: 2655-8807 where digital forensics has become a critical method for investigating electronic or digital evidence. Digital forensics aims to analyze the authenticity and relevance of evidence obtained to support criminal cases in Evidence can consist of both electronic and digital forms, such as computers, laptops, smartphones, hard drives, flash disks, and MicroSD cards. Handling digital evidence is crucial to maintaining its integrity, as it is vulnerable to changes that can affect its authenticity. This study focuses on MicroSD cards, commonly used as external storage in various devices, making them essential in digital forensic investigations . , . MicroSD cards can be key pieces of electronic evidence due to their data storage capabilities. Digital forensic investigation techniques vary across different branches, such as computer forensics, disk forensics, network forensics, cloud forensics, and mobile forensics . The investigation process can employ various methods, including those established by the National Institute of Standards and Technology (NIST) and the National Institute of Justice (NIJ) . This research aims to compare the NIJ and NIST methods to determine their effectiveness in investigating MicroSD cards. The comparison will provide valuable insights into optimizing forensic methods for technopreneurs, enhancing data integrity, and improving the efficiency of digital investigations . This study highlights the importance of robust forensic methods in supporting technopreneurial ventures. Effective forensic techniques can significantly contribute to the success of technopreneurship by ensuring reliable digital evidence management, which is crucial for informed decision-making in technological entrepreneurship . Furthermore, this research aligns with the United NationsAo Sustainable Development Goals (SDG. , particularly Goal 9: Industry. Innovation, and Infrastructure, by promoting innovative forensic methods that support the development of resilient infrastructure and foster innovation in the digital age . This study will evaluate the NIJ and NIST methods using forensic tools such as Access Data FTK Imager and autopsy. The NIJ method involves detailed stages of preparation, collection, examination, analysis, and reporting, while the NIST method includes stages of collection, examination, analysis, and reporting . By comparing these methods, this research aims to provide technopreneurs with the knowledge needed to optimize digital forensic investigations, thereby supporting the broader goals of innovation and sustainable development in the field of technopreneurship . LITERATURE REVIEW Media Storage Computer storage media is composed of two types of storage media, namely volatile memory and Non Volatile . Volatile Memory Later data will be lost when there is no electrical power or the electricity supply is interrupted, for example on Random Access Memory (RAM). Dynamic Random access Memory (DRAM), also Static Random access Memory (SRAM) Non Volatile Memory make stored data will remain saved when there is a power failure or disconnected, for example in the form of Hard Drive. Hard Disk. Nand Flash Solid State Drive (SSD). USB flash disk and MicroSD . Digital Forensics Digital Forensics is a science of computer technology with a forensic work stage to describe the steps forensics that will be carried out and can find out the research path in a structured manner, so that it can be used as a reference in finish problem in finding evidence electronics of action crime Which already occurred by using advanced technology to prove crimes using electronic evidence Which investigated in order to fight crime . Disc Forensics Disc Forensics is a part of forensics focused on analyzing device drives. Memory forensics focuses on analysis of data contained in the memory of the system being studied . Digital forensic type this is relevant by extracting data contained in the storage media through checking active , modified, or deleted. Disc Forensics including SD Card USB Stick. UFS uses CF Card and eMMC NAND flash memory . Disc Forensics is identification a number of source proof digital like hard disk with interface like SATA/SCSI. Compact Disc. Disc Videos Digital. Floppy disk, cell phone, flash drives. PDAs. Card driverAos license, storage USB. Tape Magnetic. Zip media drives etc. After confiscating the evidence digital in crime scene . Proof Digital Digital evidence is information sent or stored in binary form from the results of investigations carried out stages to protect evidence and minimize damage during the investigation so that the evidence remains APTISI Transactions on Technopreneurship (ATT). Vol. No. July 2024, pp. 169Ae181 APTISI Transactions on Technopreneurship (ATT) ye Proof required For finish case. Whereas proof electronic very sensitive will change If No handled with Correct so that can influence its authenticity . All type change on proof electronic causes evidence to be useless because it will lead to wrong conclusions. Electronic evidence attached to three main principles in the collection process, namely: the principle of referring to Indonesian National Standards (SNI), namely ISO/IEC 27037:2014 and is also regulated in Law No. 11 of 2008 regarding Electronics Information And Transaction . , . Investigation Which will done that is manifold disk forensics with goods proof electronic form MicroSD as a test parameter investigative methods . Method Investigation Study Which related with method investigation digital forensics Already Lots explained on study previously and there are many choices of methods that can be applied to digital forensics . Research on methods digital forensics. Which has studied can produce method new based on study previously or can done comparison method with compatibility method investigation digital forensics, procedure investigation digital forensic evidence, collection and analysis methods, cybercrime behavior analysis and case verification, evidence analysis as well as the judicial juridical procedures . Implement forensic techniques along with forensic analysis according to appropriate methods appropriately, it will have a success rate of almost 100% for carrying out forensic data collection . , . Related with the digital forensic investigation method chosen then the process of controlling evidence and legality, legal aspects at each stage of the methods that have been applied by investigators involved in handling electronic evidence is the main key in the success of digital forensic investigations and electronic evidence investigations must meet standards proof And acceptance of the claim for prosecution Which success . , . National Institute Justice (NIJ) Figure 1. Stage investigation National of Justice (NIJ) Figure 1 show beginnings of The National Institute of Law Enforcement and Criminal Justice founded on October 21, 1968, as a component of Law Enforcement Assistance Administration (LEAA) and in 1978 changes were made the name became the National Institute of Justice (NIJ) to date. National Institute Method of Justice (NIJ) has five stage in process forensics start from identification, collection, examination, analysis. Also reporting. According to study previously mentioned collection data with very accurate success rate by carrying out forensic techniques along with forensic analysis according to the method which appropriate . , . National Institute of Standard and Technology (NIST) Figure 2. Stage investigation National Institute of Standard and Technology (NIST) The Figure 2 National Institutes of Standards and Technology (NIST) was founded in 1901 and is now part of US department of commerce. NIST is one of the oldest physical science laboratories in the country. Congress did The formation of this agency was to eliminate a major challenge to US industrial competitiveness at that time, class measurement infrastructure BritainAos two laggards in capability. Germany, as well as other economic rivals. Smart power grid and records health electronic until OAoclock atom, nanomaterials advanced. E-ISSN: 2656-8888 | P-ISSN: 2655-8807 ye And chips computer, product And service Which not counted much depends on the technology, measurements, and standards provided by NIST. The NIST method is used to carry out an investigation process on digital evidence or a process to obtain information from digital evidence . NIST have four process stage investigation namely Collection, examination, analysis and reports. Sustainable Development Goals (SDG. Digital forensics is a science of computer technology that involves the systematic investigation of electronic or digital evidence to determine its authenticity and relevance in legal contexts . The field encompasses various branches, including computer forensics, disk forensics, network forensics, cloud forensics, and mobile forensics. Each branch employs different techniques and methodologies to handle and analyze digital evidence effectively. The National Institute of Standards and Technology (NIST) and the National Institute of Justice (NIJ) are two prominent institutions that have developed comprehensive methods for digital forensic These methods aim to ensure the integrity and accuracy of the evidence collected, which is critical for its admissibility in court . , . Figure 3. Sustainable Development Goals In Figure 3 with the United NationsAo Sustainable Development Goals (SDG. , particularly Goal 9: Industry. Innovation, and Infrastructure, the advancement of digital forensic methods plays a vital role in promoting sustainable industrialization and fostering innovation. By improving the techniques used in digital investigations, we can ensure more reliable and efficient handling of electronic evidence. This not only supports the justice system but also encourages the development of robust digital infrastructures that are essential for modern technopreneurial ventures. As digital technologies continue to evolve, the need for innovative forensic methods becomes increasingly important to maintain the integrity of digital ecosystems and support sustainable development in the digital age. This research aims to contribute to these goals by providing a comparative analysis of the NIJ and NIST methods, thereby offering insights that can enhance the capabilities of technopreneurs in managing digital evidence . , . METHODS This Figure 4 containing about stages study studies analysis comparison method National Institute of Justice (NIJ) as well as National Institute of Standard and Technology (NIST) for investigation on MicroSD. Figure 4. Stage Study Figure 4 illustrates the stages involved in the comparative study of the National Institute of Justice (NIJ) and the National Institute of Standards and Technology (NIST) methods for investigating MicroSD cards. The process begins with a comprehensive literature review to establish the foundation of existing knowledge and identify gaps. This is followed by the preparation phase, which includes the setup of both hardware and software tools necessary for the investigation. The core of the study involves the framework investigation. APTISI Transactions on Technopreneurship (ATT). Vol. No. July 2024, pp. 169Ae181 APTISI Transactions on Technopreneurship (ATT) ye where the methodologies of NIJ and NIST are systematically applied and compared. Finally, the findings are compiled and analyzed in the reporting stage, providing insights into the effectiveness and efficiency of each This structured approach ensures a thorough and balanced evaluation of the forensic techniques under Bibliometric Analysis Figure 5. Mapping research The Figure 5 show about research involves a comprehensive bibliometric analysis of previous studies using tools such as Publish or Perish and VOSviewer . The Publish or Perish tool was used to gather relevant literature, and VOSviewer was employed to map the bibliometric network, which includes journals, researchers, individual publications, and co-authorship relationships. This bibliometric network was visualized to identify similar research related to the use of NIJ and NIST methods in investigating digital evidence, specifically focusing on MicroSD cards. By examining these relationships and citations, the study aims to build on existing knowledge and identify gaps that this research can address, thereby contributing to the broader field of digital forensics and its application in technopreneurship . Preparation Systems Preparation system or system preparation in this research is an outline of the system used in investigation. Preparation system shared become two parts, namely: Preparation Hardware The hardware requirements for this research include a computer prepared to carry out comparisons between the NIJ and NIST methods for investigating MicroSD cards. The specific device used for this investigation is equipped with an Intel(R) Core(TM) i3-10110U CPU @ 2. 10GHz 2. 59 GHz processor and 4. 00GB of RAM . Additionally, a card reader with a data read speed of 37. 4MB/s and a write speed of approximately 6MB/s is utilized . Preparation Software The software preparation for this study includes setting up the operating system and the tools that will be used for the investigation process . The operating system used is Windows 11 Home Single Language version 22H2. The forensic tools utilized in this research are Access Data FTK Imager version 3. 0 and autopsy version 4. Frameworks Investigation After preparations are complete, the next stage is to carry out the investigation process. Investigation process there is two stages investigation Which covers that is: Investigation National Method Institute of Justice (NIJ) This method outlines the stages of the forensic process, which include preparation, collection, examination, analysis, and reporting . These stages explain how the research was conducted, ensuring that the research flow is systematic and can serve as a guideline for solving the problem at hand . , . E-ISSN: 2656-8888 | P-ISSN: 2655-8807 Investigation Method National Institute of Standards and Technology (NIST) Steps on cloud computing forensics according to NIST among them identification, collection, preservation, examination, interpretation and reporting results from investigations regarding digital evidence. Among the methods which can be used in forensic analysis and identification of digital evidence, this research uses methods mobile forensics which based on availability guidelines and developed by NIST. RESULTS AND DISCUSSION Scenario case which implemented in study this for simulate case follow crime Which carried out to obtain digital evidence that has been deleted. There has been a crime in the form of embezzlement of money in something company X by perpetrator follow crime initials Q, then injured process search goods proof Then found in place initial crime case T with goods proof form MicroSD and done process investigation. Frameworks Investigation This section will present the research results based on the framework stage investigation by using the method National Institutes of Justice (NIJ) and the National Institute of Standards and Technology (NIST), then carried out a comparison framework investigation And final stage reporting. National Institute of Justice (NIJ) Identification in Figure 6 is carried out by selecting electronic evidence in the form of a MicroSD cards with some of the memory data already deleted by the perpetrator, and data selection was carried out in the form of documents in the form of PDF. Docs and CSV during imaging proof digital. Furthermore with preparation tools forensics that is Access Data FTK Imager and autopsy. Figure 6. Goods Proof Form MicroSD Collection MicroSD data collection Investigation in Figure 7 was carried out using Access Data FTK Imager for imaging was carried out first with the source type in the form of physical in E01 format for original digital evidence no damaged. Figure 7. Imaging MicroSD use FTK Imager Examination in Figure 8 of data from imaging results Access Data FTK Imager examined using forensic tools autopsy. autopsy do ingest modules or analyzing data from data sources imaging results FTK Access data Imager with E01 data format so you will get a number of files on the MicroSD well thatAos it whether it has been deleted or not yet deleted, then the process of searching for digital evidence in the form of files is APTISI Transactions on Technopreneurship (ATT). Vol. No. July 2024, pp. 169Ae181 APTISI Transactions on Technopreneurship (ATT) ye carried out. docx, pdf and csv. Because files the connection with recording Money And there is a possibility connection with the scenario case. Figure 8. Do inspection data source use autopsy Analysis The results of digital data in Figure 9 searches through the MicroSD evidence investigation process with forensic tools Access Data FTK Imager and autopsy has discovered digital data that may be related to the scenario case, then an analysis process is carried out on the data that has been obtained to be used as evidence digital. Figure 9. Process Analysis Proof Digital Reporting Results in Figure 10 is investigation method NIJ has find proof digital through help tool forensics Access Data FTK Imager and autopsy. After carrying out a series of stages of the investigation process, it was discovered Digital evidence is then analyzed, after which a report is created to convey the results of the process investigation Which has done. Figure 10. Stage Reporting Results Investigation Figur 10 shows the results of the investigation report using the NIJ method. Table 1 below summarizes the stages and results of the digital investigation process using the NIJ method. E-ISSN: 2656-8888 | P-ISSN: 2655-8807 ye Table 1. Stage I Investigation National Institute of Justice Stages Results Goods proof form flash memory MicroSD and Identification election data digital which will more takes priority in process appointment the data. Collection Imaging use FTK Imager Examination Process data results imaging with autopsy Look for files which possibility relate with case Analysis use autopsy Reporting Tagging files, generate reports with use autopsy The table 1 outlines the stages and results of the digital investigation process using the NIJ method. In the identification stage, the focus is on selecting the evidence in the form of a flash memory MicroSD and prioritizing the digital data that needs to be extracted. During the collection stage, the evidence is imaged using FTK Imager, creating a digital copy of the MicroSD to preserve the original dataAos integrity. The examination stage involves processing the imaged data with autopsy, a forensic tool, to scrutinize the contents of the MicroSD. In the analysis stage, investigators search for files that may be relevant to the case using autopsy. Finally, the reporting stage includes tagging the identified files and generating comprehensive reports using autopsy to document the findings of the investigation. National Institute of Standard and Technology (NIST) Collection This stage carries out data in Figure 11 is retrieval through the use of the Access Data FTK forensic tool Imager to do imaging The evidence that has been obtained is in the form of a MicroSD Card so that integrity data from proof digital which is on MicroSD Card stay awake. Figure 11. Stage Reporting Results Investigation Examination from Figure 12 The examination stage is carried out using data from imaging results MicroSD with forensic tools Access Data FTK Imager so that in the process of checking the original data, the integrity of the data is maintained. Data contained in the MicroSD thoroughly checked to obtain the necessary digital evidence with using autopsy forensic tools. autopsy used for checking existing, modified files nor that already deleted on MicroSD to make as evidence digital Figure 12. Inspection overall data results imaging use autopsy Analysis Results from Figure 13 examinations using tools forensic autopsy continued with analysis The digital data found may be related to the case scenario being investigated get a proof digital. APTISI Transactions on Technopreneurship (ATT). Vol. No. July 2024, pp. 169Ae181 APTISI Transactions on Technopreneurship (ATT) ye Figure 13. process analysis data MicroSD Reporting Investigation results from Figure 14 through the use of the NIST method using tools Access Data FTK forensics Imager to use imaging proof digital MicroSD and next with inspection use autopsy. The investigation was carried out in accordance with the stages of the process of searching for digital evidence by carrying out stages collection that is identify digital evidence without making data changes and maintain authenticity data. Figure 14. NIST Investigation Report The report generated as shown in Figure 14 demonstrates the results of the investigation conducted using the NIST method. The process involved utilizing Access Data FTK Forensics Imager to image the digital evidence stored on the MicroSD card, followed by a detailed inspection using the Autopsy tool. Each stage of the investigation adhered to the NIST guidelines, ensuring that digital evidence was collected in a manner that preserved its integrity and authenticity. This approach minimizes data alterations and ensures that the findings remain reliable and valid for forensic analysis. Table 2. Stages I Investigation National Institute of Standart and Technology (NIST) No Stages Results Collection Imaging use FTK Imager Examination Process data results imaging with autopsy Look for files which possibility relate with case Analysis use autopsy Reporting Tagging files, generate reports with use autopsy After that with stage examination that is manage and look for on data source which already done imaging moreover first, then do the steps analysis namely analyzing data from the results of data source management which has It is possible that the files obtained are related to the case scenario and reporting stage namely reporting all results investigation which already done in Table 2. Comparison Frameworks Investigation From Table 3 Stages This done comparison method investigation NIJ And NIST use hardware and software Which has explained. Comparison two that method for look for evidence on goods proof micro SD. Table 3 presents a comparative analysis of the NIJ and NIST methods used for investigating MicroSD The comparison is structured across five key stages: Identification. Collection. Examination. Analysis, and Reporting. Both methods employ similar tools and procedures, such as using FTK Imager for imaging and Autopsy for examination and analysis. However, the NIJ method includes an additional identification stage E-ISSN: 2656-8888 | P-ISSN: 2655-8807 Table 3. Comparison Ramework Invesrigation Method National Institute of National Institute of Justice (NIJ) Standard and Technology (NIST) Stages Results Stages Results Goods proof form flash memory MicroSD and Identification Identification election data with format, docx, pdf and csv. Collection Imaging use FTK Imager Collection Imaging use FTK Imager Process data results imaging Process data results Examination Examination with autopsy imaging with autopsy Look for files which Look for files which possibility possibility related to Analysis Analysis related to the case use autopsy the case use autopsy Tagging files, generate Tagging files, generate Reporting Reporting reports with use autopsy reports with use autopsy where the type and format of data are specified, whereas the NIST method begins directly with the collection Both methods ultimately aim to identify, collect, and analyze digital evidence efficiently, ensuring data integrity and reliability throughout the investigation process. Reporting Based on the case scenario, an investigation is carried out using National Institute method of Justice (NIJ) and National Institutes of Standards and Technology (NIST) has obtained results as in table 3. Each method has its own advantages, if you want to get more detailed results then it is recommended to do it the investigation uses the NIJ method because it has more complete stages and if you want to save time It is recommended that investigations use the NIST method because it has fewer investigation stages than the method NIJ thus speeding up time investigation process. MANAGERIAL IMPLICATIONS The findings of this study offer valuable insights for managers and technopreneurs in the field of digital forensics. The comparative analysis of the NIJ and NIST methods highlights that the NIJ method is advantageous for comprehensive and detailed investigations, ensuring thorough examination and accurate reporting of digital evidence. Conversely, the NIST method provides a more streamlined approach that saves time and resources, beneficial for fast-paced environments. Managers should leverage these insights to choose the appropriate method based on their specific needs, ensuring optimal efficiency and accuracy in forensic investigations. Additionally, investing in advanced forensic tools and training can enhance the capabilities of their teams, maintaining a competitive edge in the evolving digital landscape. Aligning these practices with the Sustainable Development Goals (SDG. , particularly goal 9: Industry. Innovation, and Infrastructure, supports sustainable technological advancement and robust infrastructure development. CONCLUSION The comparative analysis of the NIJ and NIST methods for MicroSD card investigations reveals distinct advantages and drawbacks for each approach. The NIJ method with its comprehensive stages of preparation, collection, examination, analysis, and reporting, demonstrates superior thoroughness and detail making it ideal for situations where the accuracy and completeness of digital evidence are critical. On the other hand, the NIST methodAos streamlined process focuses on efficiency and speed, offering a practical solution for scenarios where time is a significant constraint. These insights are particularly valuable for technopreneurs who need to balance meticulous forensic investigations with operational efficiency, enhancing their capability to manage digital evidence effectively. APTISI Transactions on Technopreneurship (ATT). Vol. No. July 2024, pp. 169Ae181 APTISI Transactions on Technopreneurship (ATT) ye Furthermore, this research underscores the importance of adopting advanced forensic tools like Access Data FTK Imager and autopsy to ensure robust and reliable digital investigations. By integrating these tools into their investigative practices, technopreneurs can significantly improve data integrity and support sustainable business operations. This study also aligns with the United NationsAo Sustainable Development Goals (SDG. , particularly Goal 9, by promoting innovative forensic methods that contribute to the development of resilient infrastructures and foster technological innovation. Overall, the findings of this study provide a strategic framework for technopreneurs to optimize their forensic methodologies, thereby supporting informed decision making and sustainable technological entrepreneurship. DECLARATIONS Disclosure Statement No potential conflict of interest was reported by the author. ORCID Nizirwan Anwar https://orcid. org/0000-0003-1189-9093 Agung Mulyo Widodo https://orcid. org/0000-0002-9792-7114 Binastya Anggara Sekti https://orcid. org/0000-0001-5489-4888 Muhamad Bahrul Ulum https://orcid. org/0000-0001-9595-1332 Mosiur Rahaman Hani Dewi Ariessanti https://orcid. org/0009-0002-4306-0356 https://orcid. org/0000-0002-0565-9248 Author Contributions Conceptualization: N. Methodology: A. Software: B. Validation: M. and M. Formal Analysis: H. and N. Investigation: A. Resources: B. Data Curation: M. Writing Original Draft Preparation: M. and H. Writing Review and Editing: N. and A. Visualization: B. All authors. , and M. A have read and agreed to the published version of the manuscript. Data Availability Statement The data presented in this study are available on request from the corresponding author. Funding The authors received no financial support for the research, authorship, and/or publication of this article. Institutional Review Board Statement Not applicable. Informed Consent Statement Not applicable. Declaration of Competing Interest The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper. REFERENCES