{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T02:35:55Z","timestamp":1775010955323,"version":"3.50.1"},"reference-count":74,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2025,1,24]],"date-time":"2025-01-24T00:00:00Z","timestamp":1737676800000},"content-version":"vor","delay-in-days":23,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,1,24]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Individuals rely on messaging platforms to form and maintain intimate relationships, trusting shared information will remain within intended digital confines. However, the screenshot feature allows people to capture and store pieces of private conversations as a separate file on their device, rendering them shareable with third parties. While usage of this feature can be benign, this study focuses on its ability to breach privacy expectations within messaging platforms, termed within communication privacy management theory as privacy turbulence. This study recognizes the power of both interpersonal dynamics and platform affordances in constraining existing norms around screenshot collection and sharing others\u2019 private messages. Experimental results (n\u2009=\u2009302) suggest obscuring received messages upon use of the screenshot feature and stating an explicit privacy rule significantly reduce screenshot collection and sharing, respectively. Implications for communication theory and the future of messaging platform design will be discussed.<\/jats:p>","DOI":"10.1093\/jcmc\/zmae023","type":"journal-article","created":{"date-parts":[[2025,1,24]],"date-time":"2025-01-24T07:10:31Z","timestamp":1737702631000},"source":"Crossref","is-referenced-by-count":7,"title":["Understanding screenshot collection and sharing on messaging platforms: a privacy perspective"],"prefix":"10.1093","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8085-2355","authenticated-orcid":false,"given":"Alexis Shore","family":"Ingber","sequence":"first","affiliation":[{"name":"Division of Emerging Media Studies, Boston University , Boston,","place":["USA"]}]}],"member":"286","published-online":{"date-parts":[[2025,1,24]]},"reference":[{"key":"2025022504493736200_zmae023-B151","first-page":"1","volume-title":"Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems","author":"Ali","year":"2022"},{"issue":"3","key":"2025022504493736200_zmae023-B1","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1177\/146879410100100307","article-title":"Thematic networks: an analytic tool for qualitative research","volume":"1","author":"Attride-Stirling","year":"2001","journal-title":"Qualitative Research"},{"issue":"7","key":"2025022504493736200_zmae023-B2","doi-asserted-by":"publisher","first-page":"956","DOI":"10.1080\/1369118X.2015.1084349","article-title":"Sharing the small moments: Ephemeral social interaction on Snapchat","volume":"19","author":"Bayer","year":"2015","journal-title":"Information, Communication & Society"},{"issue":"1","key":"2025022504493736200_zmae023-B3","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1146\/annurev-psych-010419-050944","article-title":"Social media elements, ecologies, and effects","volume":"71","author":"Bayer","year":"2020","journal-title":"Annual Review of Psychology"},{"issue":"4","key":"2025022504493736200_zmae023-B4","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1111\/jcom.12106","article-title":"Self-disclosure in social media: Extending the functional approach to disclosure motivations and characteristics on social network sites","volume":"64","author":"Bazarova","year":"2014","journal-title":"Journal of Communication"},{"issue":"5","key":"2025022504493736200_zmae023-B5","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1093\/jcmc\/zmab007","article-title":"Do you care who flagged this post? Effects of moderator visibility on bystander behavior","volume":"26","author":"Bhandari","year":"2021","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"10","key":"2025022504493736200_zmae023-B6","doi-asserted-by":"publisher","first-page":"2551","DOI":"10.1177\/14614448211029200","article-title":"\u2018We went from the anonymity of the internet into my private WhatsApp\u2019: Rituals of transition among dating app users in Berlin","volume":"25","author":"Broeker","year":"2023","journal-title":"New Media & Society"},{"issue":"37","key":"2025022504493736200_zmae023-B7","doi-asserted-by":"publisher","first-page":"eadh2132","DOI":"10.1126\/sciadv.adh2132","article-title":"The efficacy of Facebook\u2019s vaccine misinformation policies and architecture during the COVID-19 pandemic","volume":"9","author":"Broniatowski","year":"2023","journal-title":"Science Advances"},{"issue":"8","key":"2025022504493736200_zmae023-B8","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1080\/10410236.2014.900528","article-title":"Surrogate decision makers and proxy ownership: Challenges of privacy management in health care decision making","volume":"30","author":"Bute","year":"2015","journal-title":"Health Communication"},{"key":"2025022504493736200_zmae023-B9","doi-asserted-by":"publisher","first-page":"14614448231189476","DOI":"10.1177\/14614448231189476","article-title":"Shifting platform values in community guidelines: Examining the evolution of Tik Tok\u2019s governance frameworks","author":"Chan","year":"2023","journal-title":"New Media & Society"},{"key":"2025022504493736200_zmae023-B10","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1145\/2858036.2858346","author":"Chang","year":"2016"},{"key":"2025022504493736200_zmae023-B11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3134666","article-title":"You can't stay here: The efficacy of reddit's 2015 ban examined through hate speech","volume":"1","author":"Chandrasekharan","year":"2017","journal-title":"Proceedings of the ACM on Human-computer Interaction (CSCW)"},{"key":"2025022504493736200_zmae023-B12","volume-title":"The fight for privacy: Protecting dignity, identity, and love in the digital age","author":"Citron","year":"2022"},{"key":"2025022504493736200_zmae023-B13","doi-asserted-by":"publisher","first-page":"1231","DOI":"10.1145\/3038912.3052592","author":"Cobb","year":"2017"},{"issue":"1","key":"2025022504493736200_zmae023-B14","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1007\/s12119-023-10112-z","article-title":"Channel affordances for sexting: Social presence relates to improved self-esteem, sexual gratification, and sexting certainty","volume":"28","author":"Coduto","year":"2024","journal-title":"Sexuality & Culture"},{"key":"2025022504493736200_zmae023-B15","doi-asserted-by":"crossref","DOI":"10.4324\/9780203771587","volume-title":"Statistical power analysis for the behavioral sciences","author":"Cohen","year":"2013"},{"key":"2025022504493736200_zmae023-B16","author":"Coluccini","year":"2020"},{"key":"2025022504493736200_zmae023-B152","doi-asserted-by":"crossref","DOI":"10.5210\/fm.v26i4.11649","article-title":"Screenshot, save, share, shame: making sense of new media through screenshots and public shame","author":"Corry","year":"2021","journal-title":"First Monday."},{"issue":"2","key":"2025022504493736200_zmae023-B17","doi-asserted-by":"publisher","DOI":"10.1177\/13548565221089211","article-title":"What\u2019s behind that screenshot? Digital windows and capturing data on screen","volume":"29","author":"Cramer","year":"2022","journal-title":"Convergence"},{"issue":"1\u20132","key":"2025022504493736200_zmae023-B18","first-page":"1","article-title":"Uses and gratifications of the screenshot in human communication: An exploratory study","volume":"29","author":"Cramer","year":"2019","journal-title":"The Electronic Journal of Communication"},{"issue":"3","key":"2025022504493736200_zmae023-B19","doi-asserted-by":"publisher","first-page":"e0279720","DOI":"10.1371\/journal.pone.0279720","article-title":"Data quality in online human-subjects research: Comparisons between MTurk, Prolific, Cloud Research, Qualtrics, and SONA","volume":"18","author":"Douglas","year":"2023","journal-title":"PLoS One"},{"issue":"6","key":"2025022504493736200_zmae023-B20","doi-asserted-by":"publisher","first-page":"891","DOI":"10.1177\/1461444814549930","article-title":"\u201cHe has a way gayer Facebook than I do\u201d: Investigating sexual identity disclosure and context collapse on a social networking site","volume":"18","author":"Duguay","year":"2016","journal-title":"New Media & Society"},{"issue":"1","key":"2025022504493736200_zmae023-B21","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1111\/jcc4.12180","article-title":"Explicating affordances: A conceptual framework for understanding affordances in communication research","volume":"22","author":"Evans","year":"2017","journal-title":"Journal of Computer-Mediated Communication"},{"key":"2025022504493736200_zmae023-B22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3361122","author":"Fiesler","year":"2019"},{"issue":"3","key":"2025022504493736200_zmae023-B23","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1080\/03637751.2017.1332418","article-title":"Distinguishing technologies for social interaction: The perceived social affordances of communication channels scale","volume":"84","author":"Fox","year":"2017","journal-title":"Communication Monographs"},{"issue":"5","key":"2025022504493736200_zmae023-B24","doi-asserted-by":"publisher","first-page":"e2684","DOI":"10.2196\/jmir.2684","article-title":"Anonymity versus privacy: Selective information sharing in online cancer communities","volume":"16","author":"Frost","year":"2014","journal-title":"Journal of Medical Internet Research"},{"key":"2025022504493736200_zmae023-B25","first-page":"127","author":"Geeng","year":"2020"},{"issue":"3","key":"2025022504493736200_zmae023-B26","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1177\/1461444809342738","article-title":"The politics of \u2018platforms\u2019","volume":"12","author":"Gillespie","year":"2010","journal-title":"New Media & Society"},{"issue":"5","key":"2025022504493736200_zmae023-B27","doi-asserted-by":"publisher","DOI":"10.1093\/jcmc\/zmae012","article-title":"Does ostracism\/rejection impact self-disclosures? Examining the appeal of perceived social affordances after social threat","volume":"29","author":"Grady","year":"2024","journal-title":"Journal of Computer-Mediated Communication"},{"key":"2025022504493736200_zmae023-B29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3479610","author":"Haimson","year":"2021"},{"key":"2025022504493736200_zmae023-B30","volume-title":"Privacy\u2019s blueprint: The battle to control the design of new technologies","author":"Hartzog","year":"2018"},{"key":"2025022504493736200_zmae023-B31","first-page":"385","article-title":"Obscurity by design","volume":"88","author":"Hartzog","year":"2013","journal-title":"Washington Law Review"},{"key":"2025022504493736200_zmae023-B32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3544548.3581496","author":"Hasan","year":"2023"},{"issue":"5","key":"2025022504493736200_zmae023-B33","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1080\/10510974.2017.1388827","article-title":"Females\u2019(non) disclosure of minority sexual identities in the workplace from a communication privacy management perspective","volume":"68","author":"Helens-Hart","year":"2017","journal-title":"Communication Studies"},{"key":"2025022504493736200_zmae023-B34","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1145\/142750.142769","author":"Hollan","year":"1992"},{"key":"2025022504493736200_zmae023-B35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/10811680.2024.2384356","article-title":"Protecting private communications through law and policy: The case of the screenshot feature","volume":"29","author":"Ingber","year":"2024","journal-title":"Communication Law and Policy"},{"issue":"8","key":"2025022504493736200_zmae023-B36","doi-asserted-by":"publisher","first-page":"1378","DOI":"10.1177\/1461444819878806","article-title":"The social life of screenshots: The power of visibility in teen friendship groups","volume":"22","author":"Jaynes","year":"2020","journal-title":"New Media & Society"},{"issue":"11","key":"2025022504493736200_zmae023-B37","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v21i11.6905","article-title":"A snap of intimacy: Photo-sharing practices among young people on social media","volume":"21","author":"Kofoed","year":"2016","journal-title":"First Monday"},{"issue":"2","key":"2025022504493736200_zmae023-B38","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1057\/jit.2010.6","article-title":"Online social networks: Why we disclose","volume":"25","author":"Krasnova","year":"2010","journal-title":"Journal of Information Technology"},{"issue":"1","key":"2025022504493736200_zmae023-B39","doi-asserted-by":"publisher","DOI":"10.1093\/jcmc\/zmad038","article-title":"I wanna share this, but\u2026: Explicating invested costs and privacy concerns of social grooming behaviors in Facebook and users\u2019 well-being and social capital","volume":"29","author":"Lin","year":"2024","journal-title":"Journal of Computer-Mediated Communication"},{"key":"2025022504493736200_zmae023-B40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3479504","article-title":"Collective privacy management practices: A study of privacy strategies and risks in a private Facebook group","volume":"5","author":"Mansour","year":"2021","journal-title":"Proceedings of the ACM on Human-Computer Interaction"},{"key":"2025022504493736200_zmae023-B41","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1016\/j.chb.2018.10.029","article-title":"Tea and turbulence: Communication privacy management theory and online celebrity gossip forums","volume":"92","author":"McNealy","year":"2019","journal-title":"Computers in Human Behavior"},{"key":"2025022504493736200_zmae023-B42","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.chb.2018.10.031","article-title":"Examining the impact of deterrence factors and norms on resistance to Information Systems Security","volume":"92","author":"Merhi","year":"2019","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"2025022504493736200_zmae023-B43","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1111\/j.1083-6101.2007.00328.x","article-title":"Communication privacy management in electronic commerce","volume":"12","author":"Metzger","year":"2007","journal-title":"Journal of Computer-Mediated Communication"},{"key":"2025022504493736200_zmae023-B44","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1145\/3563657.3596067","author":"Mottelson","year":"2023"},{"issue":"2","key":"2025022504493736200_zmae023-B45","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1177\/0163443718818384","article-title":"The political economy of Facebook\u2019s platformization in the mobile ecosystem: Facebook Messenger as a platform instance","volume":"41","author":"Nieborg","year":"2019","journal-title":"Media, Culture & Society"},{"key":"2025022504493736200_zmae023-B46","doi-asserted-by":"crossref","DOI":"10.1515\/9780804772891","volume-title":"Privacy in context: Technology, policy, and the integrity of social life","author":"Nissenbaum","year":"2009"},{"issue":"2","key":"2025022504493736200_zmae023-B154","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1016\/j.jcps.2012.09.001","article-title":"In search of a surrogate for touch: The effect of haptic imagery on perceived ownership","volume":"23","author":"Peck","year":"2013","journal-title":"Journal of Consumer Psychology"},{"key":"2025022504493736200_zmae023-B47","doi-asserted-by":"crossref","DOI":"10.1353\/book4588","volume-title":"Boundaries of privacy: Dialectics of disclosure","author":"Petronio","year":"2002"},{"key":"2025022504493736200_zmae023-B49","first-page":"339","author":"Pu","year":"2017"},{"issue":"3","key":"2025022504493736200_zmae023-B50","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1111\/cccr.12096","article-title":"\u201cNo overly suggestive photos of any kind\u201d: Content management and the policing of self in gay digital communities","volume":"8","author":"Roth","year":"2015","journal-title":"Communication, Culture & Critique"},{"issue":"6","key":"2025022504493736200_zmae023-B51","doi-asserted-by":"publisher","DOI":"10.1093\/jcmc\/zmad040","article-title":"The value affordances of social media engagement features","volume":"28","author":"Scharlach","year":"2023","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"19","key":"2025022504493736200_zmae023-B52","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/10447318.2022.2104428","article-title":"An exploratory analysis of interface features influencing mobile location data disclosure","volume":"39","author":"Shore","year":"2022","journal-title":"International Journal of Human\u2013Computer Interaction"},{"key":"2025022504493736200_zmae023-B53","doi-asserted-by":"publisher","DOI":"10.1177\/14614448231188929","article-title":"Platform rules as privacy tools: The influence of screenshot accountability and trust on privacy management","author":"Shore","year":"2023","journal-title":"New Media & Society."},{"key":"2025022504493736200_zmae023-B153","author":"Signal","year":"2021"},{"issue":"3","key":"2025022504493736200_zmae023-B54","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1080\/01463373.2015.1039717","article-title":"Privacy recalibration in personal relationships: Rule usage before and after an incident of privacy turbulence","volume":"63","author":"Steuber","year":"2015","journal-title":"Communication Quarterly"},{"key":"2025022504493736200_zmae023-B55","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1109\/CSCS52396.2021.00081","author":"Stoicescu","year":"2021"},{"issue":"3","key":"2025022504493736200_zmae023-B56","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1089\/1094931041291295","article-title":"The online disinhibition effect","volume":"7","author":"Suler","year":"2004","journal-title":"Cyberpsychology & Behavior"},{"issue":"6","key":"2025022504493736200_zmae023-B57","doi-asserted-by":"publisher","first-page":"1007","DOI":"10.1111\/jcom.12259","article-title":"A bad workman blames his tweets: The consequences of citizens' uncivil Twitter use when interacting with party candidates","volume":"66","author":"Theocharis","year":"2016","journal-title":"Journal of communication"},{"issue":"1","key":"2025022504493736200_zmae023-B58","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1080\/23808985.2013.11679130","article-title":"Social media use in organizations: Exploring the affordances of visibility, editability, persistence, and association","volume":"36","author":"Treem","year":"2013","journal-title":"Annals of the International Communication Association"},{"issue":"4","key":"2025022504493736200_zmae023-B59","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1093\/ct\/qtz035","article-title":"The social media privacy model: Privacy and communication in the light of social media affordances","volume":"31","author":"Trepte","year":"2021","journal-title":"Communication Theory"},{"key":"2025022504493736200_zmae023-B60","doi-asserted-by":"publisher","first-page":"106115","DOI":"10.1016\/j.chb.2019.08.022","article-title":"The privacy calculus contextualized: The influence of affordances","volume":"104","author":"Trepte","year":"2020","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"2025022504493736200_zmae023-B61","doi-asserted-by":"publisher","first-page":"1","DOI":"10.14763\/2019.2.1414","article-title":"Reframing platform power","volume":"8","author":"Van Dijck","year":"2019","journal-title":"Internet Policy Review"},{"issue":"1","key":"2025022504493736200_zmae023-B62","first-page":"220","article-title":"Managing disclosure through social media: How snapchat is shaking boundaries of privacy perceptions","volume":"6","author":"Velten","year":"2017","journal-title":"The Journal of Social Media in v Society"},{"issue":"3","key":"2025022504493736200_zmae023-B63","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1080\/03637751.2012.697628","article-title":"\u201cYou can\u2019t tell anyone but \u2026\u201d: Exploring the use of privacy rules and revealing behaviors","volume":"79","author":"Venetis","year":"2012","journal-title":"Communication Monographs"},{"issue":"6","key":"2025022504493736200_zmae023-B64","doi-asserted-by":"publisher","first-page":"1313","DOI":"10.1111\/j.1559-1816.2003.tb01951.x","article-title":"Reflections on past behavior: A self-report index of habit strength","volume":"33","author":"Verplanken","year":"2003","journal-title":"Journal of Applied Social Psychology"},{"key":"2025022504493736200_zmae023-B65","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1145\/2531602.2531672","author":"Vitak","year":"2014"},{"issue":"7","key":"2025022504493736200_zmae023-B66","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1089\/cyber.2015.0677","article-title":"The allure of privacy or the desire for self-expression? Identifying users' gratifications for ephemeral, photograph-based communication","volume":"19","author":"Waddell","year":"2016","journal-title":"Cyberpsychology, Behavior, and Social Networking"},{"issue":"1","key":"2025022504493736200_zmae023-B67","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1111\/j.1083-6101.2011.01559.x","article-title":"Exploring privacy management on Facebook: Motivations and perceived consequences of voluntary disclosure","volume":"17","author":"Waters","year":"2011","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"3","key":"2025022504493736200_zmae023-B68","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/s12525-019-00335-0","article-title":"Perceived information sensitivity and interdependent privacy protection: A quantitative study","volume":"29","author":"Wirth","year":"2019","journal-title":"Electronic Markets"},{"key":"2025022504493736200_zmae023-B69","doi-asserted-by":"publisher","first-page":"1662","DOI":"10.1145\/2818048.2819948","author":"Xu","year":"2016"},{"key":"2025022504493736200_zmae023-B70","first-page":"3637","author":"Yadav","year":"2023"},{"issue":"3","key":"2025022504493736200_zmae023-B71","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1093\/jcmc\/zmaa004","article-title":"Privacy management and self-disclosure on social network sites: The moderating effects of stress and gender","volume":"25","author":"Zhang","year":"2020","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"7","key":"2025022504493736200_zmae023-B72","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/0144929X.2022.2046162","article-title":"\u2018A right to be forgotten\u2019: Retrospective privacy concerns in social networking services","volume":"42","author":"Zhang","year":"2022","journal-title":"Behaviour & Information Technology"}],"container-title":["Journal of Computer-Mediated Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/jcmc\/article-pdf\/30\/1\/zmae023\/61615990\/zmae023.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/jcmc\/article-pdf\/30\/1\/zmae023\/61615990\/zmae023.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T04:50:00Z","timestamp":1740459000000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/jcmc\/article\/doi\/10.1093\/jcmc\/zmae023\/7978203"}},"subtitle":[],"editor":[{"given":"Jessica","family":"Vitak","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":74,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1,24]]}},"URL":"https:\/\/doi.org\/10.1093\/jcmc\/zmae023","relation":{},"ISSN":["1083-6101"],"issn-type":[{"value":"1083-6101","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2025,1]]},"published":{"date-parts":[[2025,1]]},"article-number":"zmae023"}}