{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:14:25Z","timestamp":1774541665069,"version":"3.50.1"},"reference-count":46,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T00:00:00Z","timestamp":1623110400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100010418","name":"Defence Science and Technology Laboratory","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100010418","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Digital Threats"],"published-print":{"date-parts":[[2021,9,30]]},"abstract":"<jats:p>It is difficult to discern real-world consequences of attacks on an enterprise when investigating network-centric data alone. In recent years, many tools have been developed to help understand attacks using visualisation, but few aim to predict real-world consequences. We have developed a visualisation tool that aims to improve decision support during attacks in Security Operation Centres (SOCs). Our tool visualises propagation of risks from sensor alert data to Business Process (BP) tasks. This is an important capability gap present in many SOCs today, as most threat detection tools are technology-centric. In this article, we present a user study that assesses our tool\u2019s usability and ability to support the analyst. Ten analysts from seven SOCs performed carefully designed tasks related to understanding risks and recovery decision-making. The study was conducted in laboratory conditions with simulated attacks and used a mixed-method approach to collect data from questionnaires, eye tracking, and semi-structured interviews. Our findings suggest that relating business tasks to network asset in visualisations can help analysts prioritise response strategies. Finally, our article also provides an in-depth discussion on user studies conducted with SOC analysts more generally, including lessons learned, recommendations and a critique of our own study.<\/jats:p>","DOI":"10.1145\/3430753","type":"journal-article","created":{"date-parts":[[2021,4,16]],"date-time":"2021-04-16T00:47:40Z","timestamp":1618534060000},"page":"1-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Assessing a Decision Support Tool for SOC Analysts"],"prefix":"10.1145","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0860-5130","authenticated-orcid":false,"given":"Jassim","family":"Happa","sequence":"first","affiliation":[{"name":"Information Security Group, Royal Holloway, University of London"}]},{"given":"Ioannis","family":"Agrafiotis","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Oxford"}]},{"given":"Martin","family":"Helmhout","sequence":"additional","affiliation":[{"name":"CISO office, Royal Philips"}]},{"given":"Thomas","family":"Bashford-Rogers","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Creative Technologies, University of the West of England, Bristol"}]},{"given":"Michael","family":"Goldsmith","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Oxford"}]},{"given":"Sadie","family":"Creese","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Oxford"}]}],"member":"320","published-online":{"date-parts":[[2021,6,8]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Proceedings of the IEEE International Symposium on Technologies for Homeland Security (HST\u201917)","author":"Crouser R. Jordan","year":"2017","unstructured":"R. Jordan Crouser , Erina Fukudy , and Subashini Sridhar . 2017 . Retrospective on a decade of research in visualization for cybersecurity . In Proceedings of the IEEE International Symposium on Technologies for Homeland Security (HST\u201917) . IEEE, 1\u20135. R. Jordan Crouser, Erina Fukudy, and Subashini Sridhar. 2017. Retrospective on a decade of research in visualization for cybersecurity. In Proceedings of the IEEE International Symposium on Technologies for Homeland Security (HST\u201917). IEEE, 1\u20135."},{"key":"e_1_2_1_2_1","volume-title":"Cyber Situational Awareness","author":"Jajodia Sushil","unstructured":"Sushil Jajodia , Peng Liu , Vipin Swarup , and Cliff Wang . 2009. Cyber Situational Awareness . Springer . Sushil Jajodia, Peng Liu, Vipin Swarup, and Cliff Wang. 2009. Cyber Situational Awareness. Springer."},{"key":"e_1_2_1_3_1","volume-title":"Proceedings of the IEEE International Conference on Technologies for Homeland Security (HST\u201913)","author":"Creese Sadie","year":"2013","unstructured":"Sadie Creese , Michael Goldsmith , Nick Moffat , Jassim Happa , and Ioannis Agrafiotis . 2013 . Cybervis: Visualizing the potential impact of cyber attacks on the wider enterprise . In Proceedings of the IEEE International Conference on Technologies for Homeland Security (HST\u201913) . IEEE, 73\u201379. Sadie Creese, Michael Goldsmith, Nick Moffat, Jassim Happa, and Ioannis Agrafiotis. 2013. Cybervis: Visualizing the potential impact of cyber attacks on the wider enterprise. In Proceedings of the IEEE International Conference on Technologies for Homeland Security (HST\u201913). IEEE, 73\u201379."},{"key":"e_1_2_1_4_1","volume-title":"Retrieved","author":"Business Process Modelling BPMN.","year":"2021","unstructured":"BPMN. Business Process Modelling and Notation. 1989. Retrieved April 2021 from http:\/\/www.omg.org. BPMN. Business Process Modelling and Notation. 1989. Retrieved April 2021 from http:\/\/www.omg.org."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1039834.1039864"},{"key":"e_1_2_1_6_1","volume-title":"NAGIOS Network Monitoring Software Application","author":"NAGIOS.","year":"1996","unstructured":"NAGIOS. NAGIOS Network Monitoring Software Application . 1996 . Retrieved from http:\/\/www.nagios.org\/. NAGIOS. NAGIOS Network Monitoring Software Application. 1996. Retrieved from http:\/\/www.nagios.org\/."},{"key":"e_1_2_1_7_1","unstructured":"ClamAV. Clam Anti-Virus. 2004. Retrieved from http:\/\/www.clamav.net.  ClamAV. Clam Anti-Virus. 2004. Retrieved from http:\/\/www.clamav.net."},{"key":"e_1_2_1_8_1","volume-title":"User Interface: Strategies for Effective Human-computer Interaction","author":"Shneiderman B.","year":"2004","unstructured":"B. Shneiderman and C. Plaisant . 2004 . Designing the User Interface: Strategies for Effective Human-computer Interaction ( 4 th ed.). Addison-Wesley , Boston, MA. B. Shneiderman and C. Plaisant. 2004. Designing the User Interface: Strategies for Effective Human-computer Interaction (4th ed.). Addison-Wesley, Boston, MA.","edition":"4"},{"key":"e_1_2_1_9_1","volume-title":"Networks, Maps","author":"Bertin Jacques","unstructured":"Jacques Bertin . 1983. Semiology of Graphics: Diagrams , Networks, Maps . University of Wisconsin Press. Jacques Bertin. 1983. Semiology of Graphics: Diagrams, Networks, Maps. University of Wisconsin Press."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.730558"},{"key":"e_1_2_1_11_1","unstructured":"Greg Conti. 2007. Security Data Visualization: Graphical Techniques for Network Analysis. No Starch Press.  Greg Conti. 2007. Security Data Visualization: Graphical Techniques for Network Analysis. No Starch Press."},{"key":"e_1_2_1_12_1","volume-title":"Applied Security Visualization","author":"Marty Raffael","unstructured":"Raffael Marty . 2009. Applied Security Visualization . Addison-Wesley . Raffael Marty. 2009. Applied Security Visualization. Addison-Wesley."},{"key":"e_1_2_1_13_1","unstructured":"SECVIZ. Security Visualization. 2006. Retrieved from http:\/\/www.secviz.org.  SECVIZ. Security Visualization. 2006. Retrieved from http:\/\/www.secviz.org."},{"key":"e_1_2_1_14_1","volume-title":"Proceedings of the IEEE Symposium on Visualization for Cyber Security (VizSec\u201910)","author":"Best Daniel","year":"2010","unstructured":"Daniel Best , Shawn Bohn , Douglas Love , Adam Wynne , and William Pike . 2010 . Real-time visualization of network behaviors for situational awareness . In Proceedings of the IEEE Symposium on Visualization for Cyber Security (VizSec\u201910) . ACM. Daniel Best, Shawn Bohn, Douglas Love, Adam Wynne, and William Pike. 2010. Real-time visualization of network behaviors for situational awareness. In Proceedings of the IEEE Symposium on Visualization for Cyber Security (VizSec\u201910). ACM."},{"key":"e_1_2_1_15_1","unstructured":"Greg Conti. Rumint. 2006. Retrieved from http:\/\/www.rumint.org.  Greg Conti. Rumint. 2006. Retrieved from http:\/\/www.rumint.org."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2004.1337733"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/990680.990699"},{"key":"e_1_2_1_18_1","volume-title":"Proceedings of the IEEE Symposium on Visualization for Cyber Security (VizSec\u201909)","author":"Yelizarov Anatoly","year":"2009","unstructured":"Anatoly Yelizarov and Dennis Gamayunov . 2009 . Visualization of complex attacks and state of attacked network . In Proceedings of the IEEE Symposium on Visualization for Cyber Security (VizSec\u201909) . ACM. Anatoly Yelizarov and Dennis Gamayunov. 2009. Visualization of complex attacks and state of attacked network. In Proceedings of the IEEE Symposium on Visualization for Cyber Security (VizSec\u201909). ACM."},{"key":"e_1_2_1_19_1","volume-title":"Proceedings of the IEEE Symposium on Visualization for Cyber Security (VizSec\u201910)","author":"Liao Qi","year":"2010","unstructured":"Qi Liao , Aaron Striegel , and Nitesh Chawla . 2010 . Visualizing graph dynamics and similarity for enterprise network security and management . In Proceedings of the IEEE Symposium on Visualization for Cyber Security (VizSec\u201910) . ACM. Qi Liao, Aaron Striegel, and Nitesh Chawla. 2010. Visualizing graph dynamics and similarity for enterprise network security and management. In Proceedings of the IEEE Symposium on Visualization for Cyber Security (VizSec\u201910). ACM."},{"key":"e_1_2_1_20_1","volume-title":"Proceedings of the IEEE Symposium on Visualization for Cyber Security (VizSec\u201910)","author":"Chu Matthew","year":"2010","unstructured":"Matthew Chu , Kyle Ingols , Richard Lippmann , Seth Webster , and Stephen Boyer . 2010 . Visualizing attack graphs, reachability, and trust relationships with NAVIGATOR . In Proceedings of the IEEE Symposium on Visualization for Cyber Security (VizSec\u201910) . ACM. Matthew Chu, Kyle Ingols, Richard Lippmann, Seth Webster, and Stephen Boyer. 2010. Visualizing attack graphs, reachability, and trust relationships with NAVIGATOR. In Proceedings of the IEEE Symposium on Visualization for Cyber Security (VizSec\u201910). ACM."},{"key":"e_1_2_1_21_1","volume-title":"Proceedings of the IEEE Symposium on Visualization for Cyber Security (VizSec\u201910)","author":"Rasmussen Jamie","year":"2010","unstructured":"Jamie Rasmussen , Kate Ehrlich , Steven Ross , Susanna Kirk , Daniel Gruen , and John Patterson . 2010 . Nimble cybersecurity incident management through visualization and defensible recommendations . In Proceedings of the IEEE Symposium on Visualization for Cyber Security (VizSec\u201910) . ACM. Jamie Rasmussen, Kate Ehrlich, Steven Ross, Susanna Kirk, Daniel Gruen, and John Patterson. 2010. Nimble cybersecurity incident management through visualization and defensible recommendations. In Proceedings of the IEEE Symposium on Visualization for Cyber Security (VizSec\u201910). ACM."},{"key":"e_1_2_1_22_1","volume-title":"Applied Security Visualization","author":"Marty Raffael","unstructured":"Raffael Marty . 2009. Applied Security Visualization . Addison-Wesley . Raffael Marty. 2009. Applied Security Visualization. Addison-Wesley."},{"key":"e_1_2_1_23_1","unstructured":"Greg Conti. 2007. Security Data Visualization: Graphical Techniques for Network Analysis. No Starch Press.  Greg Conti. 2007. Security Data Visualization: Graphical Techniques for Network Analysis. No Starch Press."},{"key":"e_1_2_1_24_1","unstructured":"R. Marty. 2007. SecViz.org. Retrieved from: http:\/\/secviz.org\/.  R. Marty. 2007. SecViz.org. Retrieved from: http:\/\/secviz.org\/."},{"key":"e_1_2_1_25_1","volume-title":"Proceedings of the IEEE Conference on Technologies for Homeland Security (HST\u201912)","author":"Gancarz Kyle","year":"2012","unstructured":"Kyle Gancarz and Kenneth Prole . 2012 . Visual techniques for analyzing wireless communication patterns . In Proceedings of the IEEE Conference on Technologies for Homeland Security (HST\u201912) . IEEE, 341\u2013347. Kyle Gancarz and Kenneth Prole. 2012. Visual techniques for analyzing wireless communication patterns. In Proceedings of the IEEE Conference on Technologies for Homeland Security (HST\u201912). IEEE, 341\u2013347."},{"key":"e_1_2_1_26_1","unstructured":"The Wireshark team. Wireshark. 1998. Retrieved from http:\/\/www.wireshark.org.  The Wireshark team. Wireshark. 1998. Retrieved from http:\/\/www.wireshark.org."},{"key":"e_1_2_1_27_1","volume-title":"Proceedings of the IEEE Symposium on Visualization for Cyber Security (VizSec\u201905)","author":"Abdullah Kulsoom","unstructured":"Kulsoom Abdullah , Christopher P. Lee , Gregory J. Conti , John A. Copeland , and John T. Stasko . 2005. IDS RainStorm: Visualizing IDS alarms . In Proceedings of the IEEE Symposium on Visualization for Cyber Security (VizSec\u201905) . Kulsoom Abdullah, Christopher P. Lee, Gregory J. Conti, John A. Copeland, and John T. Stasko. 2005. IDS RainStorm: Visualizing IDS alarms. In Proceedings of the IEEE Symposium on Visualization for Cyber Security (VizSec\u201905)."},{"key":"e_1_2_1_28_1","volume-title":"Arcsight Enterprise Security Manager","year":"2000","unstructured":"Arcsight. Arcsight Enterprise Security Manager . 2000 . Retrieved from http:\/\/www.arcsight.com. Arcsight. Arcsight Enterprise Security Manager. 2000. Retrieved from http:\/\/www.arcsight.com."},{"key":"e_1_2_1_29_1","unstructured":"Tenable. Tenable 3D Tool. 2011. Retrieved from http:\/\/www.tenable.com.  Tenable. Tenable 3D Tool. 2011. Retrieved from http:\/\/www.tenable.com."},{"key":"e_1_2_1_30_1","unstructured":"SecureDecisions. SecureScope. 2012. Retrieved from https:\/\/securedecisions.com.  SecureDecisions. SecureScope. 2012. Retrieved from https:\/\/securedecisions.com."},{"key":"e_1_2_1_31_1","unstructured":"Enrico Bertini. Background Literature on Evaluation for Information Visualization. Retrieved from: http:\/\/enrico.bertini.io\/publications.  Enrico Bertini. Background Literature on Evaluation for Information Visualization. Retrieved from: http:\/\/enrico.bertini.io\/publications."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/989863.989880"},{"key":"e_1_2_1_33_1","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 365\u2013371","author":"Ahlberg Christopher","year":"1994","unstructured":"Christopher Ahlberg and Ben Shneiderman . 1994 . The alphaslider: A compact and rapid selector . In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 365\u2013371 . Christopher Ahlberg and Ben Shneiderman. 1994. The alphaslider: A compact and rapid selector. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 365\u2013371."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/606658.606659"},{"key":"e_1_2_1_35_1","first-page":"741","article-title":"Evaluating the effectiveness of visual user interfaces for information retrieval. Int. J. Hum.-comput","volume":"53","author":"Sutcliffe Alistair G.","year":"2000","unstructured":"Alistair G. Sutcliffe , Mark Ennis , and J. Hu . 2000 . Evaluating the effectiveness of visual user interfaces for information retrieval. Int. J. Hum.-comput . Stud. 53 , 5 (2000), 741 \u2013 763 . Alistair G. Sutcliffe, Mark Ennis, and J. Hu. 2000. Evaluating the effectiveness of visual user interfaces for information retrieval. Int. J. Hum.-comput. Stud. 53, 5 (2000), 741\u2013763.","journal-title":"Stud."},{"key":"e_1_2_1_36_1","volume-title":"Proceedings of the 4th ACM Conference on Digital Libraries. ACM, 122\u2013129","author":"Byrd Donald","year":"1999","unstructured":"Donald Byrd . 1999 . A scrollbar-based visualization for document navigation . In Proceedings of the 4th ACM Conference on Digital Libraries. ACM, 122\u2013129 . Donald Byrd. 1999. A scrollbar-based visualization for document navigation. In Proceedings of the 4th ACM Conference on Digital Libraries. ACM, 122\u2013129."},{"key":"e_1_2_1_37_1","volume-title":"Proceedings of the IEEE Symposium on Information Visualization (INFOVIS\u201902)","author":"Plaisant Catherine","unstructured":"Catherine Plaisant , Jesse Grosjean , and Benjamin B. Bederson . 2002. Spacetree: Supporting exploration in large node link tree, design evolution and empirical evaluation . In Proceedings of the IEEE Symposium on Information Visualization (INFOVIS\u201902) . IEEE, 57\u201364. Catherine Plaisant, Jesse Grosjean, and Benjamin B. Bederson. 2002. Spacetree: Supporting exploration in large node link tree, design evolution and empirical evaluation. In Proceedings of the IEEE Symposium on Information Visualization (INFOVIS\u201902). IEEE, 57\u201364."},{"key":"e_1_2_1_38_1","first-page":"827","article-title":"Turning pictures into numbers: Extracting and generating information from complex visualizations. Int. J. Hum.-comput","volume":"53","author":"Trafton J. Gregory","year":"2000","unstructured":"J. Gregory Trafton , Susan S. Kirschenbaum , Ted L. Tsui , Robert T. Miyamoto , James A. Ballas , and Paula D. Raymond . 2000 . Turning pictures into numbers: Extracting and generating information from complex visualizations. Int. J. Hum.-comput . Stud. 53 , 5 (2000), 827 \u2013 850 . J. Gregory Trafton, Susan S. Kirschenbaum, Ted L. Tsui, Robert T. Miyamoto, James A. Ballas, and Paula D. Raymond. 2000. Turning pictures into numbers: Extracting and generating information from complex visualizations. Int. J. Hum.-comput. Stud. 53, 5 (2000), 827\u2013850.","journal-title":"Stud."},{"key":"e_1_2_1_39_1","volume-title":"Proceedings of the 11th Workshop on Visualization for Cyber Security. ACM, 49\u201356","author":"Staheli Diane","year":"2014","unstructured":"Diane Staheli , Tamara Yu , R. Jordan Crouser , Suresh Damodaran , Kevin Nam , David O\u2019Gwynn , Sean McKenna , and Lane Harrison . 2014 . Visualization evaluation for cyber security: Trends and future directions . In Proceedings of the 11th Workshop on Visualization for Cyber Security. ACM, 49\u201356 . Diane Staheli, Tamara Yu, R. Jordan Crouser, Suresh Damodaran, Kevin Nam, David O\u2019Gwynn, Sean McKenna, and Lane Harrison. 2014. Visualization evaluation for cyber security: Trends and future directions. In Proceedings of the 11th Workshop on Visualization for Cyber Security. ACM, 49\u201356."},{"key":"e_1_2_1_40_1","doi-asserted-by":"crossref","first-page":"14","DOI":"10.3102\/0013189X033007014","article-title":"Mixed methods research: A research paradigm whose time has come","volume":"33","author":"Burke Johnson R.","year":"2004","unstructured":"R. Burke Johnson and Anthony J. Onwuegbuzie . 2004 . Mixed methods research: A research paradigm whose time has come . Educ. Res. 33 , 7 (2004), 14 \u2013 26 . R. Burke Johnson and Anthony J. Onwuegbuzie. 2004. Mixed methods research: A research paradigm whose time has come. Educ. Res. 33, 7 (2004), 14\u201326.","journal-title":"Educ. Res."},{"key":"e_1_2_1_41_1","unstructured":"James Gosling. 1995. Java Programming Language.  James Gosling. 1995. Java Programming Language."},{"key":"e_1_2_1_42_1","unstructured":"Oracle. MySQL. 1995. Retrieved from http:\/\/www.mysql.com\/.  Oracle. MySQL. 1995. Retrieved from http:\/\/www.mysql.com\/."},{"key":"e_1_2_1_43_1","unstructured":"JogAmp Community. Java OpenGL (JOGL). 2005. Retrieved from http:\/\/jogamp.org\/.  JogAmp Community. Java OpenGL (JOGL). 2005. Retrieved from http:\/\/jogamp.org\/."},{"key":"e_1_2_1_44_1","unstructured":"Seeing Machines. FaceLAB. 2011. Retrieved from https:\/\/www.seeingmachines.com\/.  Seeing Machines. FaceLAB. 2011. Retrieved from https:\/\/www.seeingmachines.com\/."},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_2_1_46_1","volume-title":"Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA\u201916)","author":"Ahrend Jan M.","year":"2016","unstructured":"Jan M. Ahrend , Marina Jirotka , and Kevin Jones . 2016 . On the collaborative practices of cyber threat intelligence analysts to develop and utilize tacit threat and defence knowledge . In Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA\u201916) . IEEE, 1\u201310. Jan M. Ahrend, Marina Jirotka, and Kevin Jones. 2016. On the collaborative practices of cyber threat intelligence analysts to develop and utilize tacit threat and defence knowledge. In Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA\u201916). IEEE, 1\u201310."}],"container-title":["Digital Threats: Research and Practice"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3430753","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3430753","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:41Z","timestamp":1750195481000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3430753"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,8]]},"references-count":46,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,9,30]]}},"alternative-id":["10.1145\/3430753"],"URL":"https:\/\/doi.org\/10.1145\/3430753","relation":{},"ISSN":["2692-1626","2576-5337"],"issn-type":[{"value":"2692-1626","type":"print"},{"value":"2576-5337","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,8]]},"assertion":[{"value":"2019-09-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-10-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-06-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}