{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T15:09:38Z","timestamp":1770995378628,"version":"3.50.1"},"reference-count":117,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW1","license":[{"start":{"date-parts":[[2023,4,14]],"date-time":"2023-04-14T00:00:00Z","timestamp":1681430400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2023,4,14]]},"abstract":"<jats:p>Vulnerability intimately shapes the lived human experience and continues to gain attention in computer-supported cooperative work and human-computer interaction scholarship broadly, and in social media studies specifically. Social media comprise sociotechnical affordances that may uniquely shape lived experiences with vulnerability, rendering existing frameworks inadequate for comprehensive examinations of vulnerability as mediated on social media. Through interviews with social media users in the United States (N = 20) and drawing on feminist conceptualizations of vulnerability and social media disclosure and privacy scholarship, we propose a feminist taxonomy of social media vulnerability (FSMV). The FSMV taxonomy reflects vulnerabilitysources, states, andvalences, within which we introduce the state ofnetworked vulnerability andambivalent, desired, andundesired valences. We describe how social media enable forms of vulnerability different from in-person settings, challenge framings that synonymize vulnerability with risk\/harm, and facilitate interdisciplinary theory-building. Additionally, we discuss hownetworked, ambivalent, andun\/desired vulnerability extend and diverge from prior work to create a theoretically rich taxonomy that is useful for future work on social media and vulnerability. Finally, we discuss implications for design related to granular control over profile, content, and privacy settings, as well as implications for platform accountability, as they pertain to social media vulnerability.<\/jats:p>","DOI":"10.1145\/3579533","type":"journal-article","created":{"date-parts":[[2023,4,16]],"date-time":"2023-04-16T17:23:07Z","timestamp":1681665787000},"page":"1-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Toward a Feminist Social Media Vulnerability Taxonomy"],"prefix":"10.1145","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8466-9278","authenticated-orcid":false,"given":"Kristen","family":"Barta","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4578-0226","authenticated-orcid":false,"given":"Cassidy","family":"Pyle","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3257-2527","authenticated-orcid":false,"given":"Nazanin","family":"Andalibi","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,4,16]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1108\/MRR-03--2013-0067"},{"key":"e_1_2_1_2_1","first-page":"212","article-title":"Social penetration: The development of interpersonal relationships. Holt, Rinehart & Winston, Oxford","author":"Altman Irwin","year":"1973","unstructured":"Irwin Altman and Dalmas A. Taylor. 1973. Social penetration: The development of interpersonal relationships. Holt, Rinehart & Winston, Oxford, England. Pages: viii, 212.","journal-title":"England. Pages"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300367"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386600"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444820984473"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173732"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449201"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274288"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998243"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3137107"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/14680777.2020.1783805"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1080\/14680777.2021.1928259"},{"key":"e_1_2_1_13_1","volume-title":"Typologies and taxonomies: an introduction to classification techniques. Number 07--102 in Quantitative applications in the social sciences","author":"Bailey Kenneth D.","unstructured":"Kenneth D. Bailey. 1994. Typologies and taxonomies: an introduction to classification techniques. Number 07--102 in Quantitative applications in the social sciences. Sage Publications, Thousand Oaks, Calif."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2021.1962946"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174190"},{"key":"e_1_2_1_17_1","volume-title":"Montgomery","author":"Baxter Leslie A.","year":"1996","unstructured":"Leslie A. Baxter and Barbara M. Montgomery. 1996. Relating: Dialogues and Dialectics. Guilford Press. Google-Books-ID: RG6EujhALsEC."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcom.12106"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1177\/2056305120955176"},{"key":"e_1_2_1_20_1","volume-title":"A Networked Self","author":"DANAH BOYD.","unstructured":"DANAH BOYD. 2010. Social Network Sites as Networked Publics: Affordances, Dynamics, and Implications. In A Networked Self. Routledge. Num Pages: 20."},{"key":"e_1_2_1_21_1","volume-title":"It's Complicated: The Social Lives of Networked Teens","unstructured":"danah boyd. 2014. It's Complicated: The Social Lives of Networked Teens. Yale University Press, New Haven London."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1475--6773.2006.00684.x"},{"key":"e_1_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Andr\u00e9 Brock Jr. 2020. Distributed Blackness. New York University Press. http:\/\/www.degruyter.com\/document\/doi\/10.18574\/9781479811908\/html Publication Title: Distributed Blackness.","DOI":"10.18574\/nyu\/9781479820375.001.0001"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.07.039"},{"key":"e_1_2_1_25_1","first-page":"12","volume-title":"Vulnerability in Resistance","author":"Butler Judith","unstructured":"Judith Butler. 2016. Rethinking Vulnerability and Resistance. In Vulnerability in Resistance, Judith Butler, Zeynep Gambetti, and Leticia Sabsay (Eds.). Duke University Press, 12--27. http:\/\/www.degruyter.com\/document\/doi\/10.1515\/9780822373490-004\/html Pages: 12--27 Publication Title: Vulnerability in Resistance Section: Vulnerability in Resistance."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1177\/0049124113500475"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1080\/15456870.2015.972282"},{"key":"e_1_2_1_28_1","first-page":"239","article-title":"Women's Responses to Online Harassment","volume":"14","author":"Chadha Kalyani","year":"2020","unstructured":"Kalyani Chadha, Linda Steiner, Jessica Vitak, and Zahra Ashktorab. 2020. Women's Responses to Online Harassment. International Journal of Communication, Vol. 14, 1 (2020), 239--257. https:\/\/ijoc.org\/index.php\/ijoc\/article\/view\/11683\/2906","journal-title":"International Journal of Communication"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3299003"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0018193"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540--4560.2010.01663.x"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517475"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033--2909.116.3.457"},{"key":"e_1_2_1_34_1","volume-title":"Principles and methods of social research","author":"Crano William D.","unstructured":"William D. Crano, Marilynn B. Brewer, and Andrew Lac. 2014. Principles and methods of social research third edition ed.). Routledge, New York."},{"key":"e_1_2_1_35_1","volume-title":"Derlega and Janusz Grzelak","author":"Valerian","year":"1979","unstructured":"Valerian J. Derlega and Janusz Grzelak. 1979. Appropriateness of self-disclosure. In Self-disclosure: Origins, patterns, and implications of openness in interpersonal relationships, Gordon J. Chelune (Ed.). Jossey-Bass, San Francisco, 151--176."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173694"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3311957.3359442"},{"key":"e_1_2_1_38_1","volume-title":"Dialectical Approaches to Studying Personal Relationships, Barbara M","author":"Dindia Kathryn","unstructured":"Kathryn Dindia. 1998. 'Going into and coming out of the closet': The dialectics of stigma disclosure. In Dialectical Approaches to Studying Personal Relationships, Barbara M. Montgomery and Leslie A. Baxter (Eds.). Lawrence Erlbaum Associates, Mahwah, NJ, 83--107."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444818791318"},{"key":"e_1_2_1_40_1","unstructured":"Maeve Duggan. 2017. Online Harassment 2017. https:\/\/www.pewresearch.org\/internet\/2017\/07\/11\/online-harassment-2017\/"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1093\/jhuman"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858494"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300495"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3392845"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359198"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210604.3210629"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1527--2001.2010.01158.x"},{"key":"e_1_2_1_48_1","volume-title":"Strauss","author":"Glaser Barney G.","year":"1967","unstructured":"Barney G. Glaser and Ansel L. Strauss. 1967. The Discovery of Grounded Theory: Strategies for Qualitative Research."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274332"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415195"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v21i6.6791"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1177\/0163443719846612"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1177\/0894439318788322"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444811405805"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2971485.2987673"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445778"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcom.12185"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173881"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0256762"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444813520301"},{"key":"e_1_2_1_61_1","doi-asserted-by":"crossref","unstructured":"Nadia Karizat Daniel Delmonaco Motahhare Eslami and Nazanin Andalibi. 2021. Algorithmic Folk Theories and Identity: How TikTok Users Co-Produce Knowledge of Identity and Engage in Algorithmic Resistance. (2021) 41.","DOI":"10.1145\/3476046"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517675"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2010.6"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3450389"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1111\/bioe.12032"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2018.1437203"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675175"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1177\/0011000016641193"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1080\/08838151.2012.705195"},{"key":"e_1_2_1_70_1","doi-asserted-by":"crossref","unstructured":"Catriona Mackenzie Wendy Rogers and Susan Dodds (Eds.). 2013. Vulnerability: new essays in ethics and feminist philosophy. Oxford University Press New York.","DOI":"10.1093\/acprof:oso\/9780199316649.001.0001"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444810365313"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814543995"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3375174"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376167"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359174"},{"key":"e_1_2_1_76_1","first-page":"338","article-title":"Qualitative data analysis: An expanded sourcebook, 2nd ed. Sage Publications, Inc, Thousand Oaks, CA","author":"Miles Matthew B.","year":"1994","unstructured":"Matthew B. Miles and A. Michael Huberman. 1994. Qualitative data analysis: An expanded sourcebook, 2nd ed. Sage Publications, Inc, Thousand Oaks, CA, US. Pages: xiv, 338.","journal-title":"US. Pages"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2543579"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1176\/appi.ps.201800520"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2012.26"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327957PSPR0402_05"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444816686104"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642635"},{"key":"e_1_2_1_83_1","volume-title":"Qualitative research & evaluation methods: integrating theory and practice","author":"Patton Michael Quinn","unstructured":"Michael Quinn Patton. 2015. Qualitative research & evaluation methods: integrating theory and practice fourth edition ed.). SAGE Publications, Inc, Thousand Oaks, California."},{"key":"e_1_2_1_84_1","first-page":"0","article-title":"Privacy at the Marginstextbar Socially Mediated Visibility: Friendship and Dissent in Authoritarian Azerbaijan","volume":"12","author":"Pearce Katy E.","year":"2018","unstructured":"Katy E. Pearce, Jessica Vitak, and Kristen Barta. 2018. Privacy at the Marginstextbar Socially Mediated Visibility: Friendship and Dissent in Authoritarian Azerbaijan. International Journal of Communication, Vol. 12, 0 (March 2018), 22. https:\/\/ijoc.org\/index.php\/ijoc\/article\/view\/7039 Number: 0.","journal-title":"International Journal of Communication"},{"key":"e_1_2_1_85_1","volume-title":"Opening Up: The Healing Power of Expressing Emotions","author":"Pennebaker James W.","year":"1997","unstructured":"James W. Pennebaker. 1997. Opening Up: The Healing Power of Expressing Emotions. Guilford Press. Google-Books-ID: F3gF8OoKydQC."},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1111\/hypa.12250"},{"key":"e_1_2_1_87_1","volume-title":"Boundaries of Privacy: Dialectics of Disclosure","author":"Petronio Sandra","unstructured":"Sandra Petronio. 2002. Boundaries of Privacy: Dialectics of Disclosure. SUNY Press. Google-Books-ID: gTCsft8zVXgC."},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274408"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359172"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1177\/1362480615576271"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1177\/1477370818788006"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445331"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.3138\/ijfab.5.2.11"},{"key":"e_1_2_1_94_1","volume-title":"YouTube's PewDiePie amplified anti-Semitic rhetoric. Again. Vox (Dec","author":"Romano Aja","year":"2018","unstructured":"Aja Romano. 2018. YouTube's PewDiePie amplified anti-Semitic rhetoric. Again. Vox (Dec. 2018). https:\/\/www.vox.com\/2018\/12\/13\/18136253\/pewdiepie-vs-tseries-links-to-white-supremacist-alt-right-redpill"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1093\/oxfordhb"},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1177\/1741659013493918"},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445742"},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479512"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025766"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3895779"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444820913122"},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1080\/19419899.2020.1810745"},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998221"},{"key":"e_1_2_1_104_1","volume-title":"The polyamorists next door: inside multiple-partner relationships and families","author":"Sheff Elisabeth","unstructured":"Elisabeth Sheff. 2014. The polyamorists next door: inside multiple-partner relationships and families. Rowman & Littlefield Publishers, Inc, Lanham."},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--1--4899--3523--6_12"},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173589"},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1080\/23808985.2013.11679130"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1093\/jcmc"},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444819890353"},{"key":"e_1_2_1_110_1","volume-title":"Twitter and Tear Gas: The Power and Fragility of Networked Protest","author":"Tufekci Zeynep","unstructured":"Zeynep Tufekci. 2017. Twitter and Tear Gas: The Power and Fragility of Networked Protest. Yale University Press. Google-Books-ID: x7S_DgAAQBAJ."},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1136\/bmjopen-2019-035649"},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1145\/2468356.2479654"},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2820078"},{"key":"e_1_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376497"},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1145\/3406865.3418322"},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445134"},{"key":"e_1_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858333showDOI"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579533","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3579533","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:25Z","timestamp":1750182685000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579533"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,14]]},"references-count":117,"journal-issue":{"issue":"CSCW1","published-print":{"date-parts":[[2023,4,14]]}},"alternative-id":["10.1145\/3579533"],"URL":"https:\/\/doi.org\/10.1145\/3579533","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,14]]},"assertion":[{"value":"2023-04-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}