{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T01:34:04Z","timestamp":1773192844388,"version":"3.50.1"},"reference-count":97,"publisher":"Informa UK Limited","issue":"1","funder":[{"DOI":"10.13039\/501100000278","name":"Department for International Development","doi-asserted-by":"publisher","award":["PO40107257"],"award-info":[{"award-number":["PO40107257"]}],"id":[{"id":"10.13039\/501100000278","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1748903"],"award-info":[{"award-number":["1748903"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Technology for Development"],"published-print":{"date-parts":[[2021,1,2]]},"DOI":"10.1080\/02681102.2020.1785826","type":"journal-article","created":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T10:44:58Z","timestamp":1593600298000},"page":"13-36","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":36,"title":["Identity at the margins: data justice and refugee experiences with digital identity systems in Lebanon, Jordan, and Uganda"],"prefix":"10.1080","volume":"27","author":[{"given":"Emrys","family":"Schoemaker","sequence":"first","affiliation":[{"name":"Caribou Digital, Farnham, UK"}]},{"given":"Dina","family":"Baslan","sequence":"additional","affiliation":[{"name":"Independent Consultant, Amman, Jordan"}]},{"given":"Bryan","family":"Pon","sequence":"additional","affiliation":[{"name":"Caribou Digital, Farnham, UK"}]},{"given":"Nicola","family":"Dell","sequence":"additional","affiliation":[{"name":"The Jacobs Institute, Cornell Tech, New York, NY, USA"}]}],"member":"301","published-online":{"date-parts":[[2020,7,1]]},"reference":[{"key":"CIT0001","doi-asserted-by":"crossref","unstructured":"Aal, K., Mouratidis, M., Weibert, A. & Wulf, V. (2016). Challenges of CI initiatives in a political unstable situation-case study of a computer club in a refugee camp. InProceedings of the 19th international conference on supporting group work(pp. 409\u2013412).","DOI":"10.1145\/2957276.2996281"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20112"},{"key":"CIT0003","doi-asserted-by":"crossref","unstructured":"Almohamed, A. & Vyas, D. (2016a). Designing for the marginalized: A step towards understanding the lives of refugees and asylum seekers. InProceedings of the 2016 acm conference companion publication on designing interactive systems(pp. 165\u2013168).","DOI":"10.1145\/2908805.2909415"},{"key":"CIT0004","doi-asserted-by":"crossref","unstructured":"Almohamed, A. & Vyas, D. (2016b). Vulnerability of displacement: Challenges for integrating refugees and asylum seekers in host communities. InProceedings of the 28th Australian conference on computer-human interaction(pp. 125\u2013134).","DOI":"10.1145\/3010915.3010948"},{"key":"CIT0005","doi-asserted-by":"crossref","unstructured":"Almohamed, A., Vyas, D. & Zhang, J. (2017). Rebuilding social capital: Engaging newly arrived refugees in participatory design. InProceedings of the 29th Australian conference on computer-human interaction(pp. 59\u201367).","DOI":"10.1145\/3152771.3152778"},{"key":"CIT0006","volume-title":"Imagined communities: Reflections on the origin and spread of nationalism","author":"Anderson B.","year":"2006"},{"key":"CIT0007","first-page":"19","volume":"10","author":"Arora P.","year":"2016","journal-title":"International Journal of Communication"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1177\/1350506810377692"},{"key":"CIT0009","doi-asserted-by":"crossref","unstructured":"Barad, K. (1996). Meeting the universe halfway: Realism and social constructivism without contradiction. In: L. H. Nelson & J. Nelson (Eds),Feminism, science, and the philosophy of science. Synthese library (studies in epistemology, logic, methodology, and philosophy of science), Vol. 256. Springer.","DOI":"10.1007\/978-94-009-1742-2_9"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctv12101zq"},{"key":"CIT0011","doi-asserted-by":"crossref","unstructured":"Baranoff, J., Gonzales, R. I., Liu, J., Yang, H. & Zheng, J. (2015). Lantern: Empowering refugees through community-generated guidance using near field communication. InProceedings of the 33rd annual ACM conference extended abstracts on human factors in computing systems(pp. 7\u201312).","DOI":"10.1145\/2702613.2726950"},{"key":"CIT0012","volume-title":"Ethnic groups and boundaries: The social organization of culture difference","author":"Barth F.","year":"1998"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1006\/jado.1996.0039"},{"key":"CIT0014","volume-title":"Nomadic ethics, the cambridge companion to deleuze","author":"Bradotti R.","year":"2012"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1080\/09574042.2017.1355683"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"CIT0017","doi-asserted-by":"crossref","unstructured":"Brown, D. & Grinter, R. E (2016). Designing for transient use: A human-in-the-loop translation platform for refugees. InProceedings of the 2016 chi conference on human factors in computing systems(pp. 321\u2013330).","DOI":"10.1145\/2858036.2858230"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007068714468"},{"key":"CIT0019","unstructured":"Bustamante Duarte, A. M., Degbelo, A. & Kray, C (2018). Exploring forced migrants (Re) settlement & the role of digital services. InProceedings of 16th European conference on computer-supported cooperative work-exploratory papers."},{"key":"CIT0020","unstructured":"Butler, J. (1990). Gender trouble, feminist theory, and psychoanalytic discourse. Feminism\/postmodernism 327 x."},{"key":"CIT0021","doi-asserted-by":"crossref","unstructured":"Butler, J. (2014). Reflections on ethics, destructiveness, and life: Rosi Braidotti and the Posthuman. In B. Blaagaard (Ed.),The subject of Rosi Braidotti: Politics and concepts(pp. 21\u201328). Bloomsbury Academic. https:\/\/doi.org\/10.5040\/9781472594426.0008.","DOI":"10.5040\/9781472594426.0008"},{"key":"CIT0022","doi-asserted-by":"crossref","unstructured":"Coles-Kemp, L., Jensen, R. B. & Talhouk, R. (2018). In a new land: Mobile phones, amplified pressures and reduced capabilities. InProceedings of the 2018 chi conference on human factors in computing systems(p. 584).","DOI":"10.1145\/3173574.3174158"},{"key":"CIT0023","volume-title":"Identity at the margins: Refugee identity and data management","author":"Currion P.","year":"2018"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1177\/2053951716679678"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/5797.001.0001"},{"key":"CIT0026","unstructured":"Fearon, J. D (1999). What is identity (as we now use the word). Unpublished manuscript, Stanford University, Stanford, Calif."},{"key":"CIT0027","doi-asserted-by":"crossref","unstructured":"Fisher, K. E., Talhouk, R., Yefimova, K., Al-Shahrabi, D., Yafi, E., Ewald, S. & Comber, R (2017). Za'atari refugee cookbook: Relevance, challenges and design considerations. InProceedings of the 2017 chi conference extended abstracts on human factors in computing systems(pp. 2576\u20132583).","DOI":"10.1145\/3027063.3053235"},{"key":"CIT0028","doi-asserted-by":"crossref","unstructured":"Fisher, K. E., Yefimova, K. & Yafi, E. (2016). Future's butterflies: Co-designing ICT wayfaring technology with refugee syrian youth. InProceedings of the 15th international conference on interaction design and children(pp. 25\u201336).","DOI":"10.1145\/2930674.2930701"},{"key":"CIT0029","unstructured":"Foucault, M. (1980).The history of sexuality. Volume one: An introduction. Vintage Books."},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1093\/afraf\/adu017"},{"key":"CIT0031","doi-asserted-by":"crossref","DOI":"10.4159\/9780674037618","volume-title":"In a different voice: Psychological theory and women's development","author":"Gilligan C.","year":"1993"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177705148"},{"key":"CIT0033","doi-asserted-by":"crossref","unstructured":"Gupta, A. & Ferguson, J. (1997). Culture, power, place: Ethnography at the end of an era. In A. Gupta & J. Ferguson (Eds.), Culture, power, place: Explorations in critical anthropology (pp. 1-29). Duke University Press.","DOI":"10.2307\/j.ctv11vc7nf.4"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.2307\/3178066"},{"key":"CIT0035","unstructured":"Haraway, D. (2006). A cyborg manifesto: Science, technology, and socialist-feminism in the late 20th century. In: J. Weiss, J. Nolan, J. Hunsinger, & P. Trifonas (Eds),The international handbook of virtual learning environments. Springer."},{"key":"CIT0036","doi-asserted-by":"crossref","unstructured":"Heeks, R. & Renken, J. (2018). Data justice for development: What would it mean? Information Development, 34(1), 90\u2013102. https:\/\/doi.org\/10.1177\/0266666916678282.","DOI":"10.1177\/0266666916678282"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1093\/bjsw\/bcr013"},{"key":"CIT0038","doi-asserted-by":"crossref","unstructured":"Irani, A., Nelavelli, K., Hare, K., Bondal, P. & Kumar, N. (2018). Refuge tech: An assets-based approach to refugee resettlement. InExtended abstracts of the 2018 chi conference on human factors in computing systems(p. LBW554).","DOI":"10.1145\/3170427.3188680"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-014-9351-8"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-006-9127-x"},{"key":"CIT0041","doi-asserted-by":"crossref","unstructured":"Kazakos, K., Asthana, S., Balaam, M., Duggal, M., Holden, A., Jamir, L., Kannuri, N. K., Kumar, S., Manindla, A. R., Manikam, S. A. & Murthy, G. V. S. (2016). A real-time ivr platform for community radio. InProceedings of the 2016 chi conference on human factors in computing systems(pp. 343\u2013354).","DOI":"10.1145\/2858036.2858585"},{"key":"CIT0042","unstructured":"King, R. (1995). Migrations, globalization and place. In D. Massey & P. Jess (Eds.),A place in the world? Places, cultures and globalization. Oxford University Press."},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.3917\/dec.latou.2004.02"},{"key":"CIT0044","volume-title":"We have never been modern","author":"Latour B.","year":"2012"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.7208\/chicago\/9780226037554.001.0001"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.107.1.34"},{"key":"CIT0047","volume-title":"Identifying citizens: Id cards as surveillance","author":"Lyon D.","year":"2009"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.1177\/0162243912473162"},{"key":"CIT0049","unstructured":"Martin, A. & Segovia, A. I. (2018).Digital identity: The current state of affairs(Tech. Rep.)."},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2019.1575448"},{"key":"CIT0051","unstructured":"Mastercard (2020). Aid Network. https:\/\/www.mastercard.us\/en-us\/governments\/find-solutions\/humanitarian-aid.html."},{"key":"CIT0052","doi-asserted-by":"publisher","DOI":"10.1006\/drev.1999.0483"},{"key":"CIT0053","unstructured":"Microsoft. (n.d.). SDG Fund \u2013 Business and the United Nations. Case Study. https:\/\/www.sdgfund.org\/sites\/default\/files\/business-and-un\/SDGF_BFP_HKSCSRI_Business_and_SDGs-MICROSOFT.pdf."},{"key":"CIT0054","doi-asserted-by":"publisher","DOI":"10.1257\/aer.20141346"},{"key":"CIT0055","unstructured":"Nach, H. & Lejeune, A. (2009, June 6).The impact of information technology on identity: Framing the research agenda. Proceedings of the Administrative Sciences Association of Canada (ASAC) Conference, 2009. https:\/\/ssrn.com\/abstract=1713332."},{"key":"CIT0056","unstructured":"The New Humanitarian (2018). Audit finds UN refugee agency critically mismanaged donor funds in Uganda. https:\/\/www.thenewhumanitarian.org\/news\/2018\/11\/28\/audit-finds-un-refugee-agency-critically-mismanaged-donor-funds-uganda."},{"key":"CIT0057","doi-asserted-by":"publisher","DOI":"10.1080\/1354570022000077926"},{"key":"CIT0058","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.108.3.499"},{"key":"CIT0059","first-page":"366","volume":"7","author":"Poolman C.","year":"2012","journal-title":"POLIS Journal"},{"key":"CIT0060","doi-asserted-by":"publisher","DOI":"10.1080\/24694452.2016.1270189"},{"key":"CIT0061","doi-asserted-by":"crossref","unstructured":"Raymond, N. A. (2017). Beyond \u201cDo No Harm\u201d and individual consent: Reckoning with the emerging ethical challenges of civil society\u2019s use of data. In L. Taylor, L. Floridi, & B. van der Sloot (Eds),Group privacy. Philosophical studies series, Vol. 126. Springer.","DOI":"10.1007\/978-3-319-46608-8_4"},{"key":"CIT0062","doi-asserted-by":"crossref","unstructured":"Saini, S., Sharma, S., Gulati, A., Hussain, S. & von Braun, J. (2017, August 15).Indian food and welfare schemes: Scope for digitization towards cash transfers. ZEF-Discussion Papers on Development Policy No. 241. https:\/\/doi.org\/10.2139\/ssrn.3019115.","DOI":"10.2139\/ssrn.3019115"},{"key":"CIT0063","doi-asserted-by":"crossref","unstructured":"Schmitt, P., Iland, D., Belding, E., Tomaszewski, B., Xu, Y. & Maitland, C (2016). Community-level access divides: A refugee camp case study. InProceedings of the eighth international conference on information and communication technologies and development(p. 25).","DOI":"10.1145\/2909609.2909668"},{"key":"CIT0064","unstructured":"Segovia (2020). https:\/\/www.thesegovia.com\/."},{"key":"CIT0065","doi-asserted-by":"publisher","DOI":"10.1093\/jrs\/9.1.3"},{"key":"CIT0066","doi-asserted-by":"publisher","DOI":"10.1007\/s00127-017-1424-7"},{"key":"CIT0067","volume-title":"Selected subaltern studies","author":"Spivak R. G. G. C.","year":"1988"},{"key":"CIT0068","doi-asserted-by":"crossref","unstructured":"Stickel, O., Hornung, D., Aal, K., Rohde, M. & Wulf, V. (2015). 3D Printing with Marginalized Children-An Exploration in a Palestinian Refugee Camp. InECSCW 2015: Proceedings of the 14th European Conference on Computer Supported Cooperative Work, 19\u201323 September 2015, Oslo, Norway, Nina Boulus-R\u00f8dje, Gunnar Ellingsen, Tone Bratteteig, Margunn Aanestad, Pernille Bj\u00f8rn. Springer.","DOI":"10.1007\/978-3-319-20499-4_5"},{"key":"CIT0069","first-page":"33","volume-title":"The social psychology of intergroup relations","author":"Tajfel H.","year":"1979"},{"key":"CIT0070","doi-asserted-by":"crossref","unstructured":"Talhouk, R., Bartindale, T., Montague, K., Mesmar, S., Akik, C., Ghassani, A. & Balaam, M. (2017). Implications of synchronous IVR radio on Syrian refugee health and community dynamics. InProceedings of the 8th international conference on communities and technologies(pp. 193\u2013202).","DOI":"10.1145\/3083671.3083690"},{"key":"CIT0071","doi-asserted-by":"crossref","unstructured":"Talhouk, R., Mesmar, S., Thieme, A., Balaam, M., Olivier, P., Akik, C. & Ghattas, H. (2016). Syrian refugees and digital health in Lebanon: Opportunities for improving antenatal health. InProceedings of the 2016 chi conference on human factors in computing systems(pp. 331\u2013342).","DOI":"10.1145\/2858036.2858331"},{"key":"CIT0072","doi-asserted-by":"publisher","DOI":"10.1177\/2053951717736335"},{"key":"CIT0073","doi-asserted-by":"publisher","DOI":"10.1016\/j.geoforum.2015.07.002"},{"key":"CIT0074","doi-asserted-by":"publisher","DOI":"10.1080\/01436597.2016.1256765"},{"key":"CIT0075","unstructured":"Uganda Office of the Prime Minister (2018). Refugees management. https:\/\/opm.go.ug\/refugees-management."},{"key":"CIT0076","unstructured":"UNHCR (2018a). Biometric identity management system. http:\/\/www.unhcr.org\/en-us\/protection\/basic\/550c304c9\/biometric-identity-management-system.html."},{"key":"CIT0077","unstructured":"UNHCR (2018b). Bridging the identity divide \u2013 is portable user-centric identity management the answer? https:\/\/www.unhcr.org\/blogs\/bridging-identity-divide-portable-user-centric-identity-management-answer\/."},{"key":"CIT0078","unstructured":"UNHCR (2018c). Introduction to the guidance on registration and identity management. https:\/\/www.unhcr.org\/registration-guidance\/chapter1\/introduction-to-the-guidance-on-registration\/."},{"key":"CIT0079","unstructured":"UNHCR (2018d). Jordan factsheet. https:\/\/reliefweb.int\/report\/jordan\/unhcr-jordan-factsheet-june-2018."},{"key":"CIT0080","unstructured":"UNHCR (2018e). Lebanon. http:\/\/www.unhcr.org\/lb\/shelter."},{"key":"CIT0081","unstructured":"UNHCR (2018f). PRIMES: Population registration and identity management EcoSystem. https:\/\/www.unhcr.org\/primes.html."},{"key":"CIT0082","unstructured":"UNHCR (2018g). Registration via ProGres. http:\/\/www.unhcr.org\/en-us\/registration.html."},{"key":"CIT0083","unstructured":"UNHCR (2018h). Syrian regional refugee response. https:\/\/data2.unhcr.org\/en\/situations\/syria\/location\/36."},{"key":"CIT0084","unstructured":"UNHCR (2018i). Uganda. https:\/\/data2.unhcr.org\/en\/country\/uga."},{"key":"CIT0085","unstructured":"UNHCR (2019). Displaced & disconnected. https:\/\/www.unhcr.org\/innovation\/wp-content\/uploads\/2019\/04\/Displaced-Disconnected-WEB.pdf."},{"key":"CIT0086","unstructured":"UNHCR (2020). Registration tools. https:\/\/www.unhcr.org\/registration-guidance\/chapter3\/registration-tools\/."},{"key":"CIT0087","unstructured":"Wajcman, J. (2004).Technofeminism. Polity."},{"key":"CIT0088","doi-asserted-by":"publisher","DOI":"10.1037\/0012-1649.18.3.341"},{"key":"CIT0089","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2013.34"},{"key":"CIT0090","unstructured":"World Vision International (2020). Last mile mobile solutions. https:\/\/lmms.org\/."},{"key":"CIT0091","doi-asserted-by":"crossref","unstructured":"Xu, Y., Holzer, A., Maitland, C. & Gillet, D. (2017). Community building with co-located social media: A field experiment with syrian refugees. InProceedings of the ninth international conference on information and communication technologies and development(p. 16).","DOI":"10.1145\/3136560.3136580"},{"key":"CIT0092","doi-asserted-by":"crossref","unstructured":"Xu, Y. & Maitland, C. (2016). Communication behaviors when displaced: A case study of Za'atari Syrian refugee camp. InProceedings of the eighth international conference on information and communication technologies and development(p. 58).","DOI":"10.1145\/2909609.2909642"},{"key":"CIT0093","doi-asserted-by":"crossref","unstructured":"Xu, Y. & Maitland, C. (2017). Mobilizing assets: Data-driven community development with refugees. InProceedings of the ninth international conference on information and communication technologies and development(p. 10).","DOI":"10.1145\/3136560.3136579"},{"key":"CIT0094","doi-asserted-by":"crossref","unstructured":"Xu, Y., Maitland, C. & Tomaszewski, B. (2015). Promoting participatory community building in refugee camps with mapping technology. InProceedings of the seventh international conference on information and communication technologies and development(p. 67).","DOI":"10.1145\/2737856.2737883"},{"key":"CIT0095","doi-asserted-by":"crossref","unstructured":"Yafi, D. E. & Fisher, K. E. (2018). Syrian youth in Za\u2019atari refugee camp as ICT wayfarers: An exploratory study using LEGO and storytelling. InProceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies (COMPASS \u201918). Association for Computing Machinery, New York, NY, USA, Article 32, 1\u201312. https:\/\/doi.org\/10.1145\/3209811.3209873.","DOI":"10.1145\/3209811.3209873"},{"key":"CIT0096","doi-asserted-by":"crossref","unstructured":"Yafi, E., Yefimova, K. & Fisher, K. E. (2018). Young hackers: Hacking technology at Za'atari Syrian refugee camp. InExtended abstracts of the 2018 chi conference on human factors in computing systems(p. CS21).","DOI":"10.1145\/3170427.3174363"},{"key":"CIT0097","doi-asserted-by":"crossref","unstructured":"Yerousis, G., Aal, K., von Rekowski, T., Randall, D. W., Rohde, M. & Wulf, V. (2015). Computer-enabled project spaces: Connecting with Palestinian refugees across camp boundaries. InProceedings of the 33rd annual acm conference on human factors in computing systems(pp. 3749\u20133758).","DOI":"10.1145\/2702123.2702283"}],"container-title":["Information Technology for Development"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/02681102.2020.1785826","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,31]],"date-time":"2022-10-31T14:48:06Z","timestamp":1667227686000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/02681102.2020.1785826"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,1]]},"references-count":97,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1,2]]}},"alternative-id":["10.1080\/02681102.2020.1785826"],"URL":"https:\/\/doi.org\/10.1080\/02681102.2020.1785826","relation":{},"ISSN":["0268-1102","1554-0170"],"issn-type":[{"value":"0268-1102","type":"print"},{"value":"1554-0170","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,1]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=titd20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=titd20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2020-07-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}