{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:40:09Z","timestamp":1772556009012,"version":"3.50.1"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030490645","type":"print"},{"value":"9783030490652","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-49065-2_35","type":"book-chapter","created":{"date-parts":[[2020,7,9]],"date-time":"2020-07-09T23:56:20Z","timestamp":1594338980000},"page":"494-509","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Using Blink Rate to Detect Deception: A Study to Validate an Automatic Blink Detector and a New Dataset of Videos from Liars and Truth-Tellers"],"prefix":"10.1007","author":[{"given":"Merylin","family":"Monaro","sequence":"first","affiliation":[]},{"given":"Pasquale","family":"Capuozzo","sequence":"additional","affiliation":[]},{"given":"Federica","family":"Ragucci","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Maffei","sequence":"additional","affiliation":[]},{"given":"Antonietta","family":"Curci","sequence":"additional","affiliation":[]},{"given":"Cristina","family":"Scarpazza","sequence":"additional","affiliation":[]},{"given":"Alessandro","family":"Angrilli","sequence":"additional","affiliation":[]},{"given":"Giuseppe","family":"Sartori","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,10]]},"reference":[{"key":"35_CR1","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1002\/jip.82","volume":"5","author":"A Vrij","year":"2008","unstructured":"Vrij, A., Fisher, R., Mann, S., Leal, S.: A cognitive load approach to lie detection. Investig. Psychol. Offender Profiling 5, 39\u201343 (2008)","journal-title":"Investig. Psychol. Offender Profiling"},{"key":"35_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1111\/lcrp.12088","volume":"22","author":"A Vrij","year":"2017","unstructured":"Vrij, A., Fisher, R.P., Blank, H.: A cognitive approach to lie detection: a meta-analysis. Leg. Criminol. Psychol. 22, 1\u201321 (2017). https:\/\/doi.org\/10.1111\/lcrp.12088","journal-title":"Leg. Criminol. Psychol."},{"key":"35_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1207\/S15326985EP3801_1","volume":"38","author":"F Paas","year":"2003","unstructured":"Paas, F., Renkl, A., Sweller, J.: Cognitive load theory and instructional design: recent developments. Educ. Psychol. 38, 1\u20134 (2003). https:\/\/doi.org\/10.1207\/S15326985EP3801_1","journal-title":"Educ. Psychol."},{"key":"35_CR4","doi-asserted-by":"publisher","first-page":"14","DOI":"10.3389\/fpsyg.2013.00014","volume":"4","author":"JJ Walczyk","year":"2013","unstructured":"Walczyk, J.J., Igou, F.P., Dixon, A.P., Tcholakian, T.: Advancing lie detection by inducing cognitive load on liars: a review of relevant theories and techniques guided by lessons from polygraph-Based approaches. Front. Psychol. 4, 14 (2013). https:\/\/doi.org\/10.3389\/fpsyg.2013.00014","journal-title":"Front. Psychol."},{"key":"35_CR5","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/s10979-008-9143-y","volume":"33","author":"A Vrij","year":"2009","unstructured":"Vrij, A., Leal, S., Granhag, P.A., Mann, S., Fisher, R.P., Hillman, J., Sperry, K.: Outsmarting the liars: the benefit of asking unanticipated questions. Law Hum Behav. 33, 159\u2013166 (2009). https:\/\/doi.org\/10.1007\/s10979-008-9143-y","journal-title":"Law Hum Behav."},{"key":"35_CR6","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1080\/10683160600750264","volume":"13","author":"M Hartwig","year":"2007","unstructured":"Hartwig, M., Granhag, P.A., Str\u00e7mwall, L.: Guilty and innocent suspects\u2019 strategies during interrogations. Psychol. Crime Law Law 13, 213\u2013227 (2007)","journal-title":"Psychol. Crime Law Law"},{"key":"35_CR7","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1002\/acp.2879","volume":"27","author":"GLJ Lancaster","year":"2013","unstructured":"Lancaster, G.L.J., Vrij, A., Hope, L., Waller, B.: Sorting the liars from the truth tellers: the benefits of asking unanticipated questions on lie detection. Appl. Cogn. Psychol. 27, 107\u2013114 (2013). https:\/\/doi.org\/10.1002\/acp.2879","journal-title":"Appl. Cogn. Psychol."},{"key":"35_CR8","doi-asserted-by":"publisher","first-page":"1976","DOI":"10.1038\/s41598-018-20462-6","volume":"8","author":"M Monaro","year":"2018","unstructured":"Monaro, M., Galante, C., Spolaor, R., Li, Q.Q., Gamberini, L., Conti, M., Sartori, G.: Covert lie detection using keyboard dynamics. Sci. Rep. 8, 1976 (2018). https:\/\/doi.org\/10.1038\/s41598-018-20462-6","journal-title":"Sci. Rep."},{"key":"35_CR9","doi-asserted-by":"publisher","first-page":"e0177851","DOI":"10.1371\/journal.pone.0177851","volume":"12","author":"M Monaro","year":"2017","unstructured":"Monaro, M., Gamberini, L., Sartori, G.: The detection of faked identity using unexpected questions and mouse dynamics. PLoS ONE 12, e0177851 (2017). https:\/\/doi.org\/10.1371\/journal.pone.0177851","journal-title":"PLoS ONE"},{"key":"35_CR10","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1037\/bul0000087","volume":"143","author":"K Suchotzki","year":"2017","unstructured":"Suchotzki, K., Verschuere, B., Van Bockstaele, B., Ben-Shakhar, G., Crombez, G.: Lying takes time: a meta-analysis on reaction time measures of deception. Psychol. Bull. 143, 428\u2013453 (2017). https:\/\/doi.org\/10.1037\/bul0000087","journal-title":"Psychol. Bull."},{"key":"35_CR11","doi-asserted-by":"publisher","unstructured":"Monaro, M., Spolaor, R., QianQian, L., Conti, M., Gamberini, L., Sartori, G.: Type me the truth!: Detecting deceitful users via keystroke dynamics. In: Proceedings of the 12th International Conference on Availability, Reliability and Security, ARES 2017, Reggio Calabria, Italy (2017). https:\/\/doi.org\/10.1145\/3098954.3104047","DOI":"10.1145\/3098954.3104047"},{"key":"35_CR12","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-319-41691-5_11","volume-title":"Advances in Neuroergonomics and Cognitive Engineering","author":"M Monaro","year":"2017","unstructured":"Monaro, M., Gamberini, L., Sartori, G.: Identity verification using a kinematic memory detection technique. In: Hale, K., Stanney, K. (eds.) Advances in Neuroergonomics and Cognitive Engineering. Advances in Intelligent Systems and Computing, vol. 488, pp. 123\u2013132. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-41691-5_11"},{"key":"35_CR13","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1002\/acp.3457","volume":"33","author":"A Vrij","year":"2019","unstructured":"Vrij, A.: Deception and truth detection when analyzing nonverbal and verbal cues. Appl. Cogn. Psychol. 33, 160\u2013167 (2019). https:\/\/doi.org\/10.1002\/acp.3457","journal-title":"Appl. Cogn. Psychol."},{"key":"35_CR14","doi-asserted-by":"crossref","unstructured":"Rucker, J.C.: Normal and abnormal lid function. In: Kennard, C., Leigh, R.J. (eds.) Handbook of Clinical Neurology, vol. 102, pp. 403\u2013424. Elsevier (2011)","DOI":"10.1016\/B978-0-444-52903-9.00021-2"},{"key":"35_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-642-40483-2_11","volume-title":"Human-Computer Interaction \u2013 INTERACT 2013","author":"N Nourbakhsh","year":"2013","unstructured":"Nourbakhsh, N., Wang, Y., Chen, F.: GSR and blink features for cognitive load classification. In: Kotz\u00e9, P., Marsden, G., Lindgaard, G., Wesson, J., Winckler, M. (eds.) INTERACT 2013. LNCS, vol. 8117, pp. 159\u2013166. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40483-2_11"},{"key":"35_CR16","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/s10919-008-0051-0","volume":"32","author":"S Leal","year":"2008","unstructured":"Leal, S., Vrij, A.: Blinking during and after lying. J. Nonverbal Behav. 32, 187\u2013194 (2008). https:\/\/doi.org\/10.1007\/s10919-008-0051-0","journal-title":"J. Nonverbal Behav."},{"key":"35_CR17","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1016\/S0167-8760(00)00192-6","volume":"40","author":"K Fukuda","year":"2001","unstructured":"Fukuda, K.: Eye blinks: new indices for the detection of deception. Int. J. Psychophysiol. 40, 239\u2013245 (2001). https:\/\/doi.org\/10.1016\/S0167-8760(00)00192-6","journal-title":"Int. J. Psychophysiol."},{"key":"35_CR18","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1080\/10683160902776843","volume":"16","author":"S Leal","year":"2010","unstructured":"Leal, S., Vrij, A.: The occurrence of eye blinks during a guilty knowledge test. Psychol. Crime Law 16, 349\u2013357 (2010). https:\/\/doi.org\/10.1080\/10683160902776843","journal-title":"Psychol. Crime Law"},{"key":"35_CR19","doi-asserted-by":"publisher","unstructured":"Marchak, F.M.: Detecting false intent using eye blink measures. Front. Psychol. 4 (2013). https:\/\/doi.org\/10.3389\/fpsyg.2013.00736","DOI":"10.3389\/fpsyg.2013.00736"},{"key":"35_CR20","unstructured":"Soukupov\u00e1, T., Cech, J.: Real-time eye blink detection using facial landmarks. In: 21st Computer Vision Winter Workshop (CVWW 2016), pp. 1\u20138 (2016)"},{"key":"35_CR21","doi-asserted-by":"crossref","unstructured":"Mihalcea, R., Burzo, M.: Towards multimodal deception detection \u2013 step 1. In: Proceedings of the 14th ACM International Conference on Multimodal Interaction - ICMI 2012, p. 189. ACM Press, New York (2012)","DOI":"10.1145\/2388676.2388714"},{"key":"35_CR22","doi-asserted-by":"crossref","unstructured":"P\u00e9rez-Rosas, V., Abouelenien, M., Mihalcea, R., Burzo, M.: Deception detection using real-life trial data. In: Proceedings of the 2015 ACM on International Conference on Multimodal Interaction - ICMI 2015, pp. 59\u201366. ACM Press, New York (2015)","DOI":"10.1145\/2818346.2820758"},{"key":"35_CR23","unstructured":"P\u00e9rez-Rosas, V., Mihalcea, R., Narvaez, A., Burzo, M.: A multimodal dataset for deception detection. In: Proceedings of the Ninth International Conference on Language Resources and Evaluation (LREC 2014), pp. 3118\u20133122. European Language Resources Association (ELRA) (2014)"},{"key":"35_CR24","doi-asserted-by":"publisher","unstructured":"Yu, X., et al.: Is interactional dissynchrony a clue to deception? Insights from automated analysis of nonverbal visual cues. IEEE Trans. Cybern. 45, 492\u2013506 (2015). https:\/\/doi.org\/10.1109\/tcyb.2014.2329673","DOI":"10.1109\/tcyb.2014.2329673"},{"key":"35_CR25","doi-asserted-by":"crossref","unstructured":"P\u00e9rez-Rosas, V., Abouelenien, M., Mihalcea, R., Xiao, Y., Linton, C., Burzo, M.: Verbal and nonverbal clues for real-life deception detection. In: Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, pp. 2336\u20132346. Association for Computational Linguistics, Stroudsburg (2015)","DOI":"10.18653\/v1\/D15-1281"},{"key":"35_CR26","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.cviu.2016.01.009","volume":"147","author":"L Su","year":"2016","unstructured":"Su, L., Levine, M.: Does \u201clie to me\u201d lie to you? An evaluation of facial clues to high-stakes deception. Comput. Vis. Image Underst. 147, 52\u201368 (2016). https:\/\/doi.org\/10.1016\/j.cviu.2016.01.009","journal-title":"Comput. Vis. Image Underst."},{"key":"35_CR27","doi-asserted-by":"crossref","unstructured":"Yap, M.H., Ugail, H., Zwiggelaar, R.: A database for facial behavioural analysis. In: 2013 10th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG), pp. 1\u20136. IEEE (2013)","DOI":"10.1109\/FG.2013.6553803"},{"key":"35_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1007\/978-3-642-15567-3_34","volume-title":"Computer Vision \u2013 ECCV 2010","author":"N Michael","year":"2010","unstructured":"Michael, N., Dilsizian, M., Metaxas, D., Burgoon, J.K.: Motion profiles for deception detection using visual cues. In: Daniilidis, K., Maragos, P., Paragios, N. (eds.) ECCV 2010. LNCS, vol. 6316, pp. 462\u2013475. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15567-3_34"},{"key":"35_CR29","unstructured":"Bradski, G.: The OpenCV Library. Dr. Dobbs J. (2000)"},{"key":"35_CR30","unstructured":"King, D.E.: Dlib-ml: a machine learning toolkit. J. Mach. Learn. Res. 10, (2009)"},{"key":"35_CR31","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.ijpsycho.2017.11.009","volume":"123","author":"A Maffei","year":"2018","unstructured":"Maffei, A., Angrilli, A.: Spontaneous eye blink rate: an index of dopaminergic component of sustained attention and fatigue. Int. J. Psychophysiol. 123, 58\u201363 (2018). https:\/\/doi.org\/10.1016\/j.ijpsycho.2017.11.009","journal-title":"Int. J. Psychophysiol."},{"key":"35_CR32","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1080\/17470214808416738","volume":"1","author":"NH Mackworth","year":"1948","unstructured":"Mackworth, N.H.: The breakdown of vigilance during prolonged visual search. Q. J. Exp. Psychol. 1, 6\u201321 (1948). https:\/\/doi.org\/10.1080\/17470214808416738","journal-title":"Q. J. Exp. Psychol."},{"key":"35_CR33","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1136\/bjo.68.4.225","volume":"68","author":"D Denney","year":"1984","unstructured":"Denney, D., Denney, C.: The eye blink electro-oculogram. Br. J. Ophthalmol. 68, 225\u2013228 (1984). https:\/\/doi.org\/10.1136\/bjo.68.4.225","journal-title":"Br. J. Ophthalmol."},{"key":"35_CR34","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.jcm.2016.02.012","volume":"15","author":"TK Koo","year":"2016","unstructured":"Koo, T.K., Li, M.Y.: A guideline of selecting and reporting intraclass correlation coefficients for reliability research. J. Chiropr. Med. 15, 155\u2013163 (2016). https:\/\/doi.org\/10.1016\/j.jcm.2016.02.012","journal-title":"J. Chiropr. Med."},{"key":"35_CR35","doi-asserted-by":"publisher","unstructured":"Warmelink, L., Vrij, A., Mann, S., Leal, S., Poletiek, F.H.: The effects of unexpected questions on detecting familiar and unfamiliar lies. Psychiatry Psychol. Law 20, 29\u201335 (2013). https:\/\/doi.org\/10.1080\/13218719.2011.619058","DOI":"10.1080\/13218719.2011.619058"},{"key":"35_CR36","volume-title":"Statistical Power Analysis for the Behavioral Sciences","author":"J Cohen","year":"1988","unstructured":"Cohen, J.: Statistical Power Analysis for the Behavioral Sciences. Routledge, Hillsdale (1988)"},{"key":"35_CR37","unstructured":"JASP Team: JASP (Version 0.11.1) (2019). https:\/\/jasp-stats.org\/"},{"key":"35_CR38","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"MA Hall","year":"2009","unstructured":"Hall, M.A., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software: an update. ACM SIGKDD Explor. Newsl. 11, 10\u201318 (2009). https:\/\/doi.org\/10.1145\/1656274.1656278","journal-title":"ACM SIGKDD Explor. Newsl."},{"key":"35_CR39","doi-asserted-by":"publisher","first-page":"1100","DOI":"10.1177\/1745691617693393","volume":"12","author":"T Yarkoni","year":"2017","unstructured":"Yarkoni, T., Westfall, J.: Choosing prediction over explanation in psychology: lessons from machine learning. Perspect. Psychol. Sci. 12, 1100\u20131122 (2017). https:\/\/doi.org\/10.1177\/1745691617693393","journal-title":"Perspect. Psychol. Sci."},{"key":"35_CR40","doi-asserted-by":"publisher","unstructured":"Orr\u00f9, G., Monaro, M., Conversano, C., Gemignani, A., Sartori, G.: Machine learning in psychometrics and psychological research. Front. Psychol. 10, (2020). https:\/\/doi.org\/10.3389\/fpsyg.2019.02970","DOI":"10.3389\/fpsyg.2019.02970"},{"key":"35_CR41","unstructured":"Kohavi, R.: A study of cross-validation and bootstrap for accuracy estimation and model selection. In: Proceedings of the 14th International Joint Conference on Artificial Intelligence. pp. 1137\u20131143. Morgan Kaufmann, San Mateo (1995)"},{"key":"35_CR42","doi-asserted-by":"publisher","first-page":"191","DOI":"10.2307\/2347628","volume":"41","author":"S le Cessie","year":"1992","unstructured":"le Cessie, S., van Houwelingen, J.C.: Ridge estimators in logistic regression. Appl. Stat. 41, 191\u2013201 (1992)","journal-title":"Appl. Stat."},{"key":"35_CR43","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forest. Mach. Learn. 45, 5\u201332 (2001)","journal-title":"Mach. Learn."},{"key":"35_CR44","unstructured":"Broomhead, D.S., Lowe, D.: Radial basis functions, multi-variable functional interpolation and adaptive networks. Royals Signals & Radar Establishment (1988)"},{"key":"35_CR45","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1162\/089976601300014493","volume":"13","author":"SS Keerthi","year":"2001","unstructured":"Keerthi, S.S., Shevade, S.K., Bhattacharyya, C., Murthy, K.R.K.: Improvements to platt\u2019s SMO algorithm for SVM classifier design. Neural Comput. 13, 637\u2013649 (2001)","journal-title":"Neural Comput."},{"key":"35_CR46","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1177\/1088868314556539","volume":"19","author":"V Hauch","year":"2015","unstructured":"Hauch, V., Bland\u00f3n-Gitlin, I., Masip, J., Sporer, S.L.: Are computers effective lie detectors? A meta-analysis of linguistic cues to deception. Personal. Soc. Psychol. Rev. 19, 307\u2013342 (2015). https:\/\/doi.org\/10.1177\/1088868314556539","journal-title":"Personal. Soc. Psychol. Rev."}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction. Human Values and Quality of Life"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-49065-2_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T00:57:46Z","timestamp":1720573066000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-49065-2_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030490645","9783030490652"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-49065-2_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"10 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2020.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}