{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:22:19Z","timestamp":1750220539781,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,9]],"date-time":"2021-06-09T00:00:00Z","timestamp":1623196800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,9]]},"DOI":"10.1145\/3463677.3463731","type":"proceedings-article","created":{"date-parts":[[2021,6,9]],"date-time":"2021-06-09T23:28:31Z","timestamp":1623281311000},"page":"89-103","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Examining Daily Activities and Propaganda on Government Social Media in China:"],"prefix":"10.1145","author":[{"given":"Yumeng","family":"Luo","sequence":"first","affiliation":[{"name":"University at Albany, State University of New York, United States"}]},{"given":"Teresa","family":"M. Harrison","sequence":"additional","affiliation":[{"name":"University at Albany, State University of New York, United States"}]}],"member":"320","published-online":{"date-parts":[[2021,6,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v21i11.7090"},{"volume-title":"News in China's New Information Environment: Dissemination Patterns, Opinion Leaders and News Commentary on Weibo. Social Science Research Network","author":"Bolsover Gillian","key":"e_1_3_2_1_2_1","unstructured":"Gillian Bolsover . 2013. News in China's New Information Environment: Dissemination Patterns, Opinion Leaders and News Commentary on Weibo. Social Science Research Network , Rochester, NY . DOI:https:\/\/doi.org\/10.2139\/ssrn.2257794 10.2139\/ssrn.2257794 Gillian Bolsover. 2013. News in China's New Information Environment: Dissemination Patterns, Opinion Leaders and News Commentary on Weibo. Social Science Research Network, Rochester, NY. DOI:https:\/\/doi.org\/10.2139\/ssrn.2257794"},{"key":"e_1_3_2_1_3_1","first-page":"14","article-title":"Chinese computational propaganda: automation, algorithms and the manipulation of information about Chinese politics on Twitter and","volume":"22","author":"Bolsover Gillian","year":"2019","unstructured":"Gillian Bolsover and Philip Howard . 2019 . Chinese computational propaganda: automation, algorithms and the manipulation of information about Chinese politics on Twitter and Weibo. Inf. Commun. Soc. 22 , 14 (December 2019), 2063\u20132080. DOI:https:\/\/doi.org\/10.1080\/1369118X.2018.1476576 10.1080\/1369118X.2018.1476576 Gillian Bolsover and Philip Howard. 2019. Chinese computational propaganda: automation, algorithms and the manipulation of information about Chinese politics on Twitter and Weibo. Inf. Commun. Soc. 22, 14 (December 2019), 2063\u20132080. DOI:https:\/\/doi.org\/10.1080\/1369118X.2018.1476576","journal-title":"Weibo. Inf. Commun. Soc."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Enrique Bons\u00f3n and Melinda Ratkai. 2013. A set of metrics to assess stakeholder engagement and social legitimacy on a corporate Facebook page. Online Inf. Rev. (2013).  Enrique Bons\u00f3n and Melinda Ratkai. 2013. A set of metrics to assess stakeholder engagement and social legitimacy on a corporate Facebook page. Online Inf. Rev. (2013).","DOI":"10.1108\/OIR-03-2012-0054"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2014.11.001"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1177\/0095399710386308"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0047-2352(00)00084-2"},{"key":"e_1_3_2_1_8_1","volume-title":"Unpacking the black box: How to promote citizen engagement through government social media during the COVID-19 crisis. Comput. Hum. Behav. 110, (September","author":"Chen Qiang","year":"2020","unstructured":"Qiang Chen , Chen Min , Wei Zhang , Ge Wang , Xiaoyue Ma , and Richard Evans . 2020. Unpacking the black box: How to promote citizen engagement through government social media during the COVID-19 crisis. Comput. Hum. Behav. 110, (September 2020 ), 106380. DOI:https:\/\/doi.org\/10.1016\/j.chb.2020.106380 10.1016\/j.chb.2020.106380 Qiang Chen, Chen Min, Wei Zhang, Ge Wang, Xiaoyue Ma, and Richard Evans. 2020. Unpacking the black box: How to promote citizen engagement through government social media during the COVID-19 crisis. Comput. Hum. Behav. 110, (September 2020), 106380. DOI:https:\/\/doi.org\/10.1016\/j.chb.2020.106380"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1177\/1868102619899409"},{"key":"e_1_3_2_1_10_1","volume-title":"Retrieved","author":"China Internet Network Information Center","year":"2019","unstructured":"China Internet Network Information Center . 2019 . Statistical Report on Internet Development in China . Retrieved January 26, 2021 from https:\/\/cnnic.com.cn\/IDR\/ReportDownloads\/201911\/P020191112539794960687.pdf China Internet Network Information Center. 2019. Statistical Report on Internet Development in China. Retrieved January 26, 2021 from https:\/\/cnnic.com.cn\/IDR\/ReportDownloads\/201911\/P020191112539794960687.pdf"},{"key":"e_1_3_2_1_11_1","unstructured":"Yun-han Chu Yu-tzung Chang Min-Hua Huang and Mark Weatherall. 2016. Re-assessing the popular foundation of Asian democracies: findings from four waves of the Asian Barometer Survey. Taipei Natl. Taiwan Univ. (2016).  Yun-han Chu Yu-tzung Chang Min-Hua Huang and Mark Weatherall. 2016. Re-assessing the popular foundation of Asian democracies: findings from four waves of the Asian Barometer Survey. Taipei Natl. Taiwan Univ. (2016)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.2202\/1944-2866.1130"},{"key":"e_1_3_2_1_13_1","first-page":"1","article-title":"The New Public Service: An Approach to","volume":"8","author":"Denhardt Robert B.","year":"2003","unstructured":"Robert B. Denhardt and Janet V. Denhardt . 2003 . The New Public Service: An Approach to Reform. Int. Rev. Public Adm. 8 , 1 (July 2003), 3\u201310. DOI:https:\/\/doi.org\/10.1080\/12294659.2003.10805013 10.1080\/12294659.2003.10805013 Robert B. Denhardt and Janet V. Denhardt. 2003. The New Public Service: An Approach to Reform. Int. Rev. Public Adm. 8, 1 (July 2003), 3\u201310. DOI:https:\/\/doi.org\/10.1080\/12294659.2003.10805013","journal-title":"Reform. Int. Rev. Public Adm."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2912160.2912174"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2017.10.003"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.01631"},{"key":"e_1_3_2_1_17_1","volume-title":"Political bots and the manipulation of public opinion in Venezuela. Available at SSRN 2635800","author":"Forelle Michelle","year":"2015","unstructured":"Michelle Forelle , Philip N. Howard , Andr\u00e9s Monroy-Hern\u00e1ndez , and Saiph Savage . 2015. Political bots and the manipulation of public opinion in Venezuela. Available at SSRN 2635800 ( 2015 ). Michelle Forelle, Philip N. Howard, Andr\u00e9s Monroy-Hern\u00e1ndez, and Saiph Savage. 2015. Political bots and the manipulation of public opinion in Venezuela. Available at SSRN 2635800 (2015)."},{"volume-title":"Strategic management: A stakeholder approach","author":"Freeman R. Edward","key":"e_1_3_2_1_18_1","unstructured":"R. Edward Freeman . 2010. Strategic management: A stakeholder approach . Cambridge university press . R. Edward Freeman. 2010. Strategic management: A stakeholder approach. Cambridge university press."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pubrev.2015.02.001"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2020.223"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441876"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2912160.2912189"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3085228.3085316"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1080\/10810730.2016.1157653"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1177\/109861101129197789"},{"key":"e_1_3_2_1_26_1","volume-title":"Picking the best intercoder reliability statistic for your digital activism content analysis. Digit. Act. Res. Proj. 243, 11","author":"Joyce Mary","year":"2013","unstructured":"Mary Joyce . 2013. Picking the best intercoder reliability statistic for your digital activism content analysis. Digit. Act. Res. Proj. 243, 11 ( 2013 ). Mary Joyce. 2013. Picking the best intercoder reliability statistic for your digital activism content analysis. Digit. Act. Res. Proj. 243, 11 (2013)."},{"key":"e_1_3_2_1_27_1","volume-title":"Box","author":"King Cheryl Simrell","year":"1998","unstructured":"Cheryl Simrell King , Camilla Stivers , and Richard C . Box . 1998 . Government Is Us: Strategies for an Anti-Government Era. SAGE. Cheryl Simrell King, Camilla Stivers, and Richard C. Box. 1998. Government Is Us: Strategies for an Anti-Government Era. SAGE."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0003055417000144"},{"key":"e_1_3_2_1_29_1","unstructured":"Klaus Krippendorff. 2011. Computing Krippendorff's alpha-reliability. (2011). Retrieved from https:\/\/repository.upenn.edu\/cgi\/viewcontent.cgi?article=1043&context=asc_papers  Klaus Krippendorff. 2011. Computing Krippendorff's alpha-reliability. (2011). Retrieved from https:\/\/repository.upenn.edu\/cgi\/viewcontent.cgi?article=1043&context=asc_papers"},{"volume-title":"Content analysis: An introduction to its methodology","author":"Krippendorff Klaus","key":"e_1_3_2_1_30_1","unstructured":"Klaus Krippendorff . 2018. Content analysis: An introduction to its methodology . Sage publications. Klaus Krippendorff. 2018. Content analysis: An introduction to its methodology. Sage publications."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1002\/pa.1687"},{"key":"e_1_3_2_1_32_1","volume-title":"Police in social media: To protect and share? First Monday","author":"Gal Yavetz Azi","year":"2021","unstructured":"Azi Lev-on and Gal Yavetz . 2021. Police in social media: To protect and share? First Monday ( 2021 ). DOI:https:\/\/doi.org\/10.5210\/fm.v26i1.10459 10.5210\/fm.v26i1.10459 Azi Lev-on and Gal Yavetz. 2021. Police in social media: To protect and share? First Monday (2021). DOI:https:\/\/doi.org\/10.5210\/fm.v26i1.10459"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1080\/10584609.2020.1765914"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1080\/14719037.2012.691010"},{"key":"e_1_3_2_1_35_1","volume-title":"Computational propaganda in Canada: The use of political bots. Computational Propaganda Research Project","author":"McKelvey Fenwick","year":"2017","unstructured":"Fenwick McKelvey and Elizabeth Dubois . 2017. Computational propaganda in Canada: The use of political bots. Computational Propaganda Research Project . Oxford . UK. ( 2017 ). Fenwick McKelvey and Elizabeth Dubois. 2017. Computational propaganda in Canada: The use of political bots. Computational Propaganda Research Project. Oxford. UK. (2017)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2013.05.015"},{"key":"e_1_3_2_1_37_1","volume-title":"Computational Propaganda in Taiwan: Where Digital Democracy Meets Automated Autocracy. Computational Propaganda Research Project","author":"Monaco Nicholas J","year":"2017","unstructured":"Nicholas J Monaco . 2017. Computational Propaganda in Taiwan: Where Digital Democracy Meets Automated Autocracy. Computational Propaganda Research Project . Oxford . UK. ( 2017 ), 35. Nicholas J Monaco. 2017. Computational Propaganda in Taiwan: Where Digital Democracy Meets Automated Autocracy. Computational Propaganda Research Project. Oxford. UK. (2017), 35."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2013.05.016"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1177\/0011128714530548"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1111\/gove.12045"},{"key":"e_1_3_2_1_41_1","volume-title":"Retrieved","author":"Office of the State Council","year":"2016","unstructured":"Office of the State Council . 2016 . The government organizations should respond to citizens\u2019 need on soical media in a timely fashion . Retrieved January 26, 2021 from http:\/\/www.gov.cn\/xinwen\/2016-08\/12\/content_5099154.htm Office of the State Council. 2016. The government organizations should respond to citizens\u2019 need on soical media in a timely fashion. Retrieved January 26, 2021 from http:\/\/www.gov.cn\/xinwen\/2016-08\/12\/content_5099154.htm"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2016.11.001"},{"key":"e_1_3_2_1_43_1","volume-title":"Computational propaganda in Russia: the origins of digital misinformation. Computational Propaganda Research Project","author":"Sanovich Sergey","year":"2017","unstructured":"Sergey Sanovich . 2017. Computational propaganda in Russia: the origins of digital misinformation. Computational Propaganda Research Project . Oxford, UK . ( 2017 ). Sergey Sanovich. 2017. Computational propaganda in Russia: the origins of digital misinformation. Computational Propaganda Research Project. Oxford, UK. (2017)."},{"key":"e_1_3_2_1_44_1","first-page":"2","article-title":"Police presentational strategies on Twitter in Canada","volume":"26","author":"Schneider Christopher J.","year":"2016","unstructured":"Christopher J. Schneider . 2016 . Police presentational strategies on Twitter in Canada . Polic. Soc. 26 , 2 (February 2016), 129\u2013147. DOI:https:\/\/doi.org\/10.1080\/10439463.2014.922085 10.1080\/10439463.2014.922085 Christopher J. Schneider. 2016. Police presentational strategies on Twitter in Canada. Polic. Soc. 26, 2 (February 2016), 129\u2013147. DOI:https:\/\/doi.org\/10.1080\/10439463.2014.922085","journal-title":"Polic. Soc."},{"volume-title":"Towards the E-society","author":"Scholl Hans J.","key":"e_1_3_2_1_45_1","unstructured":"Hans J. Scholl . 2001. Applying stakeholder theory to e-government . In Towards the E-society . Springer , 735\u2013747. Hans J. Scholl. 2001. Applying stakeholder theory to e-government. In Towards the E-society. Springer, 735\u2013747."},{"key":"e_1_3_2_1_46_1","first-page":"4","article-title":"Towards a More Holistic Stakeholder Analysis Approach. Mapping Known and Undiscovered Stakeholders from Social","volume":"5","author":"Sedereviciute Kristina","year":"2011","unstructured":"Kristina Sedereviciute and Chiara Valentini . 2011 . Towards a More Holistic Stakeholder Analysis Approach. Mapping Known and Undiscovered Stakeholders from Social Media. Int. J. Strateg. Commun. 5 , 4 (October 2011), 221\u2013239. DOI:https:\/\/doi.org\/10.1080\/1553118X.2011.592170 10.1080\/1553118X.2011.592170 Kristina Sedereviciute and Chiara Valentini. 2011. Towards a More Holistic Stakeholder Analysis Approach. Mapping Known and Undiscovered Stakeholders from Social Media. Int. J. Strateg. Commun. 5, 4 (October 2011), 221\u2013239. DOI:https:\/\/doi.org\/10.1080\/1553118X.2011.592170","journal-title":"Media. Int. J. Strateg. Commun."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1177\/0894439308316404"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2016.05.018"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47874-6_19"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.4018\/jgim.2005010102"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-6210.2006.00594.x"},{"key":"e_1_3_2_1_52_1","volume-title":"Int. Cyber Policy Cent. Barton","author":"Uren Tom","year":"2019","unstructured":"Tom Uren , Elise Thomas , and Jacob Wallis . 2019. Tweeting Through the Great Firewall: Preliminary Analysis of PRC-linked Information Operations on the Hong Kong Protests. Aust. Strateg. Policy Inst . Int. Cyber Policy Cent. Barton ( 2019 ). Tom Uren, Elise Thomas, and Jacob Wallis. 2019. Tweeting Through the Great Firewall: Preliminary Analysis of PRC-linked Information Operations on the Hong Kong Protests. Aust. Strateg. Policy Inst. Int. Cyber Policy Cent. Barton (2019)."},{"key":"e_1_3_2_1_53_1","first-page":"34","article-title":"Police social service work in China: community policing with Chinese characteristics","volume":"9","author":"Wang Xiaohai","year":"2012","unstructured":"Xiaohai Wang and Sing Wing Wong . 2012 . Police social service work in China: community policing with Chinese characteristics . Asia Pac. J. Police Crim. Justice 9 , 1 (2012), 34 \u2013 54 . Xiaohai Wang and Sing Wing Wong. 2012. Police social service work in China: community policing with Chinese characteristics. Asia Pac. J. Police Crim. Justice 9, 1 (2012), 34\u201354.","journal-title":"Asia Pac. J. Police Crim. Justice"},{"key":"e_1_3_2_1_54_1","volume-title":"Retrieved","author":"Xi","year":"2016","unstructured":"Xi jingping. 2016 . Xi Jingping's speech at the cyber-information conference] . Retrieved January 27, 2021 from http:\/\/www.xinhuanet.com\/\/politics\/2016-04\/25\/c_1118731175.htm Xi jingping. 2016. Xi Jingping's speech at the cyber-information conference]. Retrieved January 27, 2021 from http:\/\/www.xinhuanet.com\/\/politics\/2016-04\/25\/c_1118731175.htm"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2016.05.023"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1353\/chn.2018.0000","article-title":"Positive Energy\u201d: Hegemonic Intervention and Online Media Discourse in China's Xi Jinping Era","volume":"16","author":"Yang Peidong","year":"2018","unstructured":"Peidong Yang and Lijun Tang . 2018 . \u201c Positive Energy\u201d: Hegemonic Intervention and Online Media Discourse in China's Xi Jinping Era . China Int. J. 16 , 1 (2018), 1 \u2013 22 . Peidong Yang and Lijun Tang. 2018. \u201cPositive Energy\u201d: Hegemonic Intervention and Online Media Discourse in China's Xi Jinping Era. China Int. J. 16, 1 (2018), 1\u201322.","journal-title":"China Int. J."},{"volume-title":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing, IEEE, 514\u2013519","author":"Yu Louis Lei","key":"e_1_3_2_1_57_1","unstructured":"Louis Lei Yu , Sitaram Asur , and Bernardo A. Huberman . 2012. Artificial inflation: the real story of trends and trend-setters in Sina Weibo . In 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing, IEEE, 514\u2013519 . Louis Lei Yu, Sitaram Asur, and Bernardo A. Huberman. 2012. Artificial inflation: the real story of trends and trend-setters in Sina Weibo. In 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing, IEEE, 514\u2013519."},{"key":"e_1_3_2_1_58_1","volume-title":"Global Times. Retrieved","author":"Yu Zhang","year":"2016","unstructured":"Zhang Yu . 2016 . China recognizes \u2018good netizens\u2019 who spread \u2018positive energy .\u2019 Global Times. Retrieved January 27, 2021 from https:\/\/www.globaltimes.cn\/content\/982759.shtml Zhang Yu. 2016. China recognizes \u2018good netizens\u2019 who spread \u2018positive energy.\u2019 Global Times. Retrieved January 27, 2021 from https:\/\/www.globaltimes.cn\/content\/982759.shtml"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2013.05.017"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2014.01.011"},{"key":"e_1_3_2_1_61_1","volume-title":"Retrieved","author":"Indiana University Network Science Institute.","year":"2021","unstructured":"Indiana University Network Science Institute. Indiana University Network Science Institute . Retrieved January 27, 2021 from https:\/\/iuni.iu.edu\/projects\/project Indiana University Network Science Institute. Indiana University Network Science Institute. Retrieved January 27, 2021 from https:\/\/iuni.iu.edu\/projects\/project"}],"event":{"name":"DG.O'21: The 22nd Annual International Conference on Digital Government Research","acronym":"DG.O'21","location":"Omaha NE USA"},"container-title":["DG.O2021: The 22nd Annual International Conference on Digital Government Research"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3463677.3463731","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3463677.3463731","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:25:08Z","timestamp":1750195508000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3463677.3463731"}},"subtitle":["A Case Study of Weibo Use by Beijing Police Department"],"short-title":[],"issued":{"date-parts":[[2021,6,9]]},"references-count":61,"alternative-id":["10.1145\/3463677.3463731","10.1145\/3463677"],"URL":"https:\/\/doi.org\/10.1145\/3463677.3463731","relation":{},"subject":[],"published":{"date-parts":[[2021,6,9]]},"assertion":[{"value":"2021-06-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}