{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T08:53:50Z","timestamp":1769072030291,"version":"3.49.0"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,3,26]],"date-time":"2020-03-26T00:00:00Z","timestamp":1585180800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,3,26]],"date-time":"2020-03-26T00:00:00Z","timestamp":1585180800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61772133"],"award-info":[{"award-number":["61772133"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972087"],"award-info":[{"award-number":["61972087"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012456","name":"National Social Science Foundation of China","doi-asserted-by":"crossref","award":["19@ZH014"],"award-info":[{"award-number":["19@ZH014"]}],"id":[{"id":"10.13039\/501100012456","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Jiangsu Provincial Key Project","award":["BE2018706"],"award-info":[{"award-number":["BE2018706"]}]},{"name":"Natural Science Foundation of Jiangsu province","award":["SBK2019022870"],"award-info":[{"award-number":["SBK2019022870"]}]},{"name":"Jiangsu Provincial Key Laboratory of Network and Information Security","award":["BM2003201"],"award-info":[{"award-number":["BM2003201"]}]},{"name":"Key Laboratory of Computer Network and Information Integration of Ministry of Education of China","award":["93K-9"],"award-info":[{"award-number":["93K-9"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["World Wide Web"],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1007\/s11280-020-00792-0","type":"journal-article","created":{"date-parts":[[2020,3,26]],"date-time":"2020-03-26T06:02:46Z","timestamp":1585202566000},"page":"1831-1859","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Topic based time-sensitive influence maximization in online social networks"],"prefix":"10.1007","volume":"23","author":[{"given":"Huiyu","family":"Min","sequence":"first","affiliation":[]},{"given":"Jiuxin","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Tangfei","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,26]]},"reference":[{"key":"792_CR1","unstructured":"Aggarwal, C., Lin, S., Yu, P.: On influential node discovery in dynamic social networks. Proceedings of the 12th SIAM international conference on data mining, SDM pp. 636\u2013647 (2012) 2012"},{"key":"792_CR2","doi-asserted-by":"crossref","first-page":"651","DOI":"10.1145\/3035918.3035924","volume-title":"Proceedings of the 2017 ACM International Conference on Management of Data","author":"A Arora","year":"2017","unstructured":"Arora, A., Galhotra, S., Ranu, S.: Debunking the myths of influence maximization: An in-depth benchmarking study. In: Proceedings of the 2017 ACM International Conference on Management of Data, pp. 651\u2013666. ACM (2017)"},{"key":"792_CR3","unstructured":"Aslam, S.: Twitter by the numbers: Stats, demographics & fun facts. Omnicore. https:\/\/www.omnicoreagency.com\/twitter-statistics\/ (2018, September 18)"},{"issue":"3","key":"792_CR4","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1007\/s10115-013-0646-6","volume":"37","author":"N Barbieri","year":"2013","unstructured":"Barbieri, N., Bonchi, F., Manco, G.: Topic-aware social influence propagation models. Knowledge & Information Systems. 37(3), 555\u2013584 (2013)","journal-title":"Knowledge & Information Systems"},{"issue":"1\u20137","key":"792_CR5","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/S0169-7552(98)00110-X","volume":"30","author":"S Brin","year":"1998","unstructured":"Brin, S., Page, L.: The anatomy of a large-scale hypertextual web search engine. Computer networks and ISDN systems. 30(1\u20137), 107\u2013117 (1998)","journal-title":"Computer networks and ISDN systems"},{"key":"792_CR6","first-page":"583","volume":"48","author":"J Cao","year":"2018","unstructured":"Cao, J., Cui, G., Feng, X., Min, H.: Cost-based advertising strategy in social networks. Journal of Southeast University (Natural Science Edition). 48, 583\u2013589 (2018)","journal-title":"Journal of Southeast University (Natural Science Edition)"},{"key":"792_CR7","first-page":"3","volume-title":"Web Information Systems Engineering - WISE 2016 - 17th International Conference,2016","author":"J Cao","year":"2016","unstructured":"Cao, J., Zhou, T., Dong, D., Xu, S., Zhu, Z., Zhuo, M., Liu, B.: Attribute-Based Influence Maximization in Social Networks. In: Web Information Systems Engineering - WISE 2016 - 17th International Conference,2016, vol. 10041, pp. 3\u201318 (2016)"},{"key":"792_CR8","first-page":"238","volume":"38","author":"JX Cao","year":"2015","unstructured":"Cao, J.X., Dong, D., Xu, S., Zheng, X., Liu, B., Luo, J.Z.: A k-core based algorithm for influence maximization in social networks. Chinese Journal of Computers. 38, 238\u2013248 (2015)","journal-title":"Chinese Journal of Computers"},{"key":"792_CR9","first-page":"1495","volume":"42","author":"JX Cao","year":"2019","unstructured":"Cao, J.X., Min, H.Y., Wang, H.R., Ma, Z., Liu, B.: Self-interest influence maximization algorithm based on subject preference in competitive environment. Chinese Journal of Computers. 42, 1495\u20131510 (2019)","journal-title":"Chinese Journal of Computers"},{"issue":"6","key":"792_CR10","doi-asserted-by":"publisher","first-page":"666","DOI":"10.14778\/2735703.2735706","volume":"8","author":"S Chen","year":"2015","unstructured":"Chen, S., Fan, J., Li, G., Feng, J., Tan, K.L., Tang, J.: Online topic-aware influence maximization. Proceedings of the VLDB Endowment. 8(6), 666\u2013677 (2015)","journal-title":"Online topic-aware influence maximization. Proceedings of the VLDB Endowment"},{"key":"792_CR11","unstructured":"Chen, W., Lin, T., Yang, C.: Efficient topic-aware influence maximization using preprocessing. CoRR, abs\/1403.0057 (2014)"},{"key":"792_CR12","first-page":"592","volume-title":"Proceedings of the 26th AAAI Conference on Artificial Intelligence","author":"W Chen","year":"2012","unstructured":"Chen, W., Lu, W., Zhang, N.: Time-critical influence maximization in social networks with time-delayed diffusion process. In: Proceedings of the 26th AAAI Conference on Artificial Intelligence, pp. 592\u2013598 (2012)"},{"key":"792_CR13","doi-asserted-by":"publisher","first-page":"1029","DOI":"10.1145\/1835804.1835934","volume-title":"Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining","author":"W Chen","year":"2010","unstructured":"Chen, W., Wang, C., Wang, Y.: Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 1029\u20131038. ACM (2010)"},{"key":"792_CR14","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1145\/1557019.1557047","volume-title":"Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining","author":"W Chen","year":"2009","unstructured":"Chen, W., Wang, Y., Yang, S.: Efficient influence maximization in social networks. In: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 199\u2013208. ACM (2009)"},{"key":"792_CR15","doi-asserted-by":"crossref","unstructured":"Chen, X., Song, G., He, X., et al.: On influential nodes tracking in dynamic social networks. Proceedings of the 2015 SIAM International Conference on Data Mining. Society for Industrial and Applied Mathematics, SDM 2015 pp. 613\u2013621 (2015)","DOI":"10.1137\/1.9781611974010.69"},{"key":"792_CR16","first-page":"57","volume-title":"Proceedings of the 7th ACM SIGKDD international conference on Knowledge discovery and data mining","author":"P Domingos","year":"2001","unstructured":"Domingos, P., Richardson, M.: Mining the network value of customers. In: Proceedings of the 7th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 57\u201366. ACM (2001)"},{"key":"792_CR17","doi-asserted-by":"crossref","first-page":"743","DOI":"10.1145\/2882903.2882929","volume-title":"Proceedings of the 2016 International Conference on Management of Data","author":"S Galhotra","year":"2016","unstructured":"Galhotra, S., Arora, A., Roy, S.: Holistic influence maximization: Combining scalability and efficiency with opinion-aware models. In: Proceedings of the 2016 International Conference on Management of Data, pp. 743\u2013758. ACM (2016)"},{"key":"792_CR18","doi-asserted-by":"crossref","unstructured":"Goyal, A., Lu, W., Lakshmanan, L. V.: Celf++: optimizing the greedy algorithm for influence maximization in social networks. In: Proceedings of the 20th international conference companion on World wide web, pp. 47\u201348. ACM (2011)","DOI":"10.1145\/1963192.1963217"},{"key":"792_CR19","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1109\/ICDM.2011.132","volume-title":"2011 IEEE 11th international conference on data mining","author":"A Goyal","year":"2011","unstructured":"Goyal, A., Lu, W., Lakshmanan, L.V.: Simpath: An efficient algorithm for influence maximization under the linear threshold model. In: 2011 IEEE 11th international conference on data mining, pp. 211\u2013220. IEEE (2011)"},{"issue":"3","key":"792_CR20","first-page":"817","volume":"19","author":"E G\u00fcney","year":"2019","unstructured":"G\u00fcney, E.: On the optimal solution of budgeted influence maximization problem in social networks. Oper. Res. 19(3), 817\u2013831 (2019)","journal-title":"Oper. Res."},{"issue":"6","key":"792_CR21","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1509\/jm.10.0088","volume":"75","author":"O Hinz","year":"2011","unstructured":"Hinz, O., Skiera, B., Barrot, C., Becker, J.U.: Seeding strategies for viral marketing: an empirical comparison. J. Mark. 75(6), 55\u201371 (2011)","journal-title":"J. Mark."},{"key":"792_CR22","first-page":"1351","volume-title":"Proceedings of the 18th IEEE International Conference on Communication Technology","author":"M Hu","year":"2018","unstructured":"Hu, M., Liu, Q., Huang, H., Jia, X.: Time-Sensitive Influence Maximization in Social Networks. In: Proceedings of the 18th IEEE International Conference on Communication Technology, pp. 1351\u20131356 (2018)"},{"key":"792_CR23","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1109\/CGC.2013.61","volume-title":"2013 International Conference on Cloud and Green Computing","author":"OA Hussain","year":"2013","unstructured":"Hussain, O.A., Anwar, Z., Saleem, S., Zaidi, F.: Empirical analysis of seed selection criterion in influence mining for different classes of networks. In: 2013 International Conference on Cloud and Green Computing, pp. 348\u2013353. IEEE (2013)"},{"key":"792_CR24","unstructured":"Jiawei, Z., Wang, S., Zhan, Q., Yu, P.: Intertwined viral marketing in social networks. In: 2016 IEEE\/ACM international conference on advances in social networks analysis and mining, ASONAM 2016, pp. 239\u2013246 (2016)"},{"key":"792_CR25","doi-asserted-by":"crossref","unstructured":"Jung, K., Heo, W., Chen, W.: Irie: Scalable and robust influence maximization in social networks. In: 2012 IEEE 12th International Conference on Data Mining, pp. 918\u2013923. IEEE (2012)","DOI":"10.1109\/ICDM.2012.79"},{"key":"792_CR26","doi-asserted-by":"crossref","unstructured":"Kempe, D., Kleinberg, J., Tardos, \u00c9.: Maximizing the spread of influence through a social network. In: Proceedings of the 9th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 137\u2013146. ACM (2003)","DOI":"10.1145\/956750.956769"},{"key":"792_CR27","unstructured":"Kim, J., Kim, S. K., Yu, H.: Scalable and parallelizable processing of influence maximization for large-scale social networks? In: 2013 IEEE 29th International Conference on Data Engineering (ICDE), pp. 266\u2013277. IEEE (2013)"},{"key":"792_CR28","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.knosys.2014.02.013","volume":"62","author":"J Kim","year":"2014","unstructured":"Kim, J., Lee, W., Yu, H.: Ct-ic: continuously activated and time-restricted independent cascade model for viral marketing. Knowl.-Based Syst. 62, 57\u201368 (2014)","journal-title":"Knowl.-Based Syst."},{"key":"792_CR29","doi-asserted-by":"crossref","unstructured":"Ko, Y. Y., Chae, D. K., Kim, S. W.: Accurate path-based methods for influence maximization in social networks. In: Proceedings of the 25th International Conference Companion on World Wide Web, pp. 59\u201360. International World Wide Web Conferences Steering Committee (2016)","DOI":"10.1145\/2872518.2889407"},{"key":"792_CR30","doi-asserted-by":"crossref","unstructured":"Leskovec, J., Krause, A., Guestrin, C., Faloutsos, C., VanBriesen, J., Glance, N.: Cost-effective outbreak detection in networks. In: Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 420\u2013429. ACM (2007)","DOI":"10.1145\/1281192.1281239"},{"key":"792_CR31","first-page":"643","volume":"39","author":"GL Li","year":"2016","unstructured":"Li, G.L., Chu, Y.P., Feng, J.H., XU, Y.Q.: Influence maximization on multiple social networks. Chinese Journal of Computers. 39, 643\u2013656 (2016)","journal-title":"Chinese Journal of Computers"},{"issue":"10","key":"792_CR32","doi-asserted-by":"publisher","first-page":"1852","DOI":"10.1109\/TKDE.2018.2807843","volume":"30","author":"Y Li","year":"2018","unstructured":"Li, Y., Fan, J., Wang, Y., Tan, K.L.: Influence maximization on social graphs: a survey. IEEE Trans. Knowl. Data Eng. 30(10), 1852\u20131872 (2018)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"792_CR33","doi-asserted-by":"crossref","unstructured":"Liu, B., Cong, G., Xu, D., Zeng, Y.: Time constrained influence maximization in social networks. In: 2012 IEEE 12th international conference on data mining, pp. 439\u2013448. IEEE (2012)","DOI":"10.1109\/ICDM.2012.158"},{"issue":"8","key":"792_CR34","doi-asserted-by":"publisher","first-page":"1904","DOI":"10.1109\/TKDE.2013.106","volume":"26","author":"B Liu","year":"2014","unstructured":"Liu, B., Cong, G., Zeng, Y., Xu, D., Chee, Y.M.: Influence spreading path and its application to the time constrained social influence maximization problem and beyond. IEEE Trans. Knowl. Data Eng. 26(8), 1904\u20131917 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"792_CR35","doi-asserted-by":"crossref","unstructured":"Liu, G., Fu, Y., Xu, T., Xiong, H., Chen, G.: Discovering temporal retweeting patterns for social media marketing campaigns. In: 2014 IEEE international conference on data mining, pp. 905\u2013910. IEEE (2014)","DOI":"10.1109\/ICDM.2014.48"},{"key":"792_CR36","unstructured":"Mochalova, A., Nanopoulos, A.: On The Role Of Centrality In Information Diffusion In Social Networks. In: 21st European Conference on Information Systems, p. 101 (2013)"},{"issue":"6","key":"792_CR37","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1177\/0165551515602808","volume":"41","author":"A Mohammadi","year":"2015","unstructured":"Mohammadi, A., Saraee, M., Mirzaei, A.: Time-sensitive influence maximization in social networks. J. Inf. Sci. 41(6), 765\u2013778 (2015)","journal-title":"J. Inf. Sci."},{"issue":"1","key":"792_CR38","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/BF01588971","volume":"14","author":"GL Nemhauser","year":"1978","unstructured":"Nemhauser, G.L., Wolsey, L.A., Fisher, M.L.: An analysis of approximations for maximizing submodular set functions\u2014I. Math. Program. 14(1), 265\u2013294 (1978)","journal-title":"Math. Program."},{"key":"792_CR39","doi-asserted-by":"publisher","first-page":"1077","DOI":"10.14778\/2994509.2994525","volume":"9","author":"N Ohsaka","year":"2016","unstructured":"Ohsaka, N., Akiba, T., Yoshida, Y.: Kawarabayashi, K.i.: dynamic influence analysis in evolving networks. Proceedings of the VLDB Endowment. 9, 1077\u20131088 (2016)","journal-title":"Proceedings of the VLDB Endowment"},{"key":"792_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2816815","volume":"34","author":"C Petersen","year":"2016","unstructured":"Petersen, C., Simonsen, J., Lioma, C.: Power law distributions in information retrieval. ACM Trans. Inf. Syst. 34, 1\u201337 (2016)","journal-title":"ACM Trans. Inf. Syst."},{"key":"792_CR41","doi-asserted-by":"crossref","unstructured":"Tang, J., Sun, J., Wang, C., et al.: Social influence analysis in large-scale networks. Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. pp. 807\u2013816. ACM (2009)","DOI":"10.1145\/1557019.1557108"},{"issue":"476","key":"792_CR42","doi-asserted-by":"publisher","first-page":"1566","DOI":"10.1198\/016214506000000302","volume":"101","author":"YW Teh","year":"2006","unstructured":"Teh, Y.W., Jordan, M.I., Beal, M.J., Blei, D.M.: Hierarchical Dirichlet processes. J. Am. Stat. Assoc. 101(476), 1566\u20131581 (2006)","journal-title":"J. Am. Stat. Assoc."},{"issue":"1","key":"792_CR43","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/TNET.2016.2563397","volume":"25","author":"G Tong","year":"2017","unstructured":"Tong, G., Wu, W., Tang, S., Du, D.Z.: Adaptive influence maximization in dynamic social networks. IEEE\/ACM Transactions on Networking (TON). 25(1), 112\u2013125 (2017)","journal-title":"IEEE\/ACM Transactions on Networking (TON)"},{"issue":"3","key":"792_CR44","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1111\/j.1756-2589.2011.00097.x","volume":"3","author":"SK Walker","year":"2011","unstructured":"Walker, S.K.: Connected: the surprising power of our social networks and how they shape our lives. J. Fam. Theory Rev. 3(3), 220\u2013224 (2011)","journal-title":"J. Fam. Theory Rev."},{"key":"792_CR45","doi-asserted-by":"crossref","unstructured":"Weng, J., Lim, E. P., Jiang, J., He, Q.: Twitterrank: finding topic-sensitive influential twitterers. In: Proceedings of the third ACM international conference on Web search and data mining, pp. 261\u2013270. ACM (2010)","DOI":"10.1145\/1718487.1718520"},{"key":"792_CR46","doi-asserted-by":"crossref","unstructured":"Wu, H., Shang, J., Zhou, S., Feng, Y.: A linear time algorithm for influence maximization in large-scale social networks. In: International Conference on Neural Information Processing, pp. 752\u2013761. Springer (2017)","DOI":"10.1007\/978-3-319-70139-4_76"},{"key":"792_CR47","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/3313294.3313382","volume-title":"Proceedings of the 4th International Workshop on Social Sensing","author":"X Wu","year":"2019","unstructured":"Wu, X., Fu, L., Meng, J., et al.: Maximizing Influence Diffusion over Evolving Social Networks. In: Proceedings of the 4th International Workshop on Social Sensing, vol. 2019, pp. 6\u201311 (2019)"},{"key":"792_CR48","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Zhou, J., Cheng, J.: Preference-based top-k influential nodes mining in social networks. In: 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1512\u20131518. IEEE (2011)","DOI":"10.1109\/TrustCom.2011.209"},{"key":"792_CR49","doi-asserted-by":"crossref","unstructured":"Zhou, T., Cao, J., Liu, B., Xu, S., Zhu, Z., Luo, J.: Location-based influence maximization in social networks. In: proceedings of the 24th ACM international conference on information and knowledge management, CIKM 2015, pp. 1211\u20131220 (2015)","DOI":"10.1145\/2806416.2806462"},{"key":"792_CR50","doi-asserted-by":"crossref","unstructured":"Zhuang, H., Sun, Y., Tang, J., Zhang, J., Sun, X.: Influence Maximization in Dynamic Social Networks. Proceedings of IEEE International Conference on Data Mining, ICDM pp. 1313\u20131318 (2013)","DOI":"10.1109\/ICDM.2013.145"}],"container-title":["World Wide Web"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-020-00792-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11280-020-00792-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-020-00792-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,26]],"date-time":"2021-03-26T01:03:03Z","timestamp":1616720583000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11280-020-00792-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,26]]},"references-count":50,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,5]]}},"alternative-id":["792"],"URL":"https:\/\/doi.org\/10.1007\/s11280-020-00792-0","relation":{},"ISSN":["1386-145X","1573-1413"],"issn-type":[{"value":"1386-145X","type":"print"},{"value":"1573-1413","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,26]]},"assertion":[{"value":"1 May 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 October 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 January 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 March 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}