{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:58:47Z","timestamp":1776113927383,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":81,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T00:00:00Z","timestamp":1745539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["EXC 2092 CASA - 390781972"],"award-info":[{"award-number":["EXC 2092 CASA - 390781972"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,26]]},"DOI":"10.1145\/3706598.3713983","type":"proceedings-article","created":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T04:35:25Z","timestamp":1745469325000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Bridging the Gap Between Usable Security Research and Open-Source Practice - Lessons From a Long-Term Engagement With VeraCrypt"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-0769-4046","authenticated-orcid":false,"given":"Felix","family":"Reichmann","sequence":"first","affiliation":[{"name":"Ruhr University Bochum, Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7959-9743","authenticated-orcid":false,"given":"Annalina","family":"Buckmann","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7610-5963","authenticated-orcid":false,"given":"Konstantin","family":"Fischer","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1823-5505","authenticated-orcid":false,"given":"M. Angela","family":"Sasse","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-1843-2027","authenticated-orcid":false,"given":"Alena","family":"Naiakshina","sequence":"additional","affiliation":[{"name":"University of Cologne, Cologne, Germany"}]}],"member":"320","published-online":{"date-parts":[[2025,4,25]]},"reference":[{"key":"e_1_3_3_3_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev.2016.013"},{"key":"e_1_3_3_3_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev.2017.17"},{"key":"e_1_3_3_3_4_2","unstructured":"Oleg Afonin. 2021. Breaking VeraCrypt: Obtaining and Extracting On-The-Fly Encryption Keys. https:\/\/blog.elcomsoft.com\/2021\/06\/breaking-veracrypt-obtaining-and-extracting-on-the-fly-encryption-keys\/"},{"key":"e_1_3_3_3_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00122"},{"key":"e_1_3_3_3_6_2","series-title":"(SOUPS \u201915)","first-page":"69","volume-title":"Proceedings of the Eleventh USENIX Conference on Usable Privacy and Security","author":"Atwater Erinn","year":"2015","unstructured":"Erinn Atwater, Cecylia Bocovich, Urs Hengartner, Ed Lank, and Ian Goldberg. 2015. Leading Johnny to water: designing for usability and trust. In Proceedings of the Eleventh USENIX Conference on Usable Privacy and Security(SOUPS \u201915). USENIX Association, USA, 69\u201388."},{"key":"e_1_3_3_3_7_2","unstructured":"Unknown Author. 2014. Migrating from TrueCrypt to BitLocker. https:\/\/truecrypt.sourceforge.net\/."},{"key":"e_1_3_3_3_8_2","unstructured":"Mauro Baluda Andreas Fuchs Philipp Holzinger Lisa Nguyen Lotfi ben Othmane Andreas Poller J\u00fcrgen Repp Johannes Sp\u00e4th Jan Steffan Stefan Triller and Eric Bodden. 2015. Security Analysis of TrueCrypt. https:\/\/www.bsi.bund.de\/DE\/Service-Navi\/Publikationen\/Studien\/TrueCrypt\/truecrypt.html"},{"key":"e_1_3_3_3_9_2","doi-asserted-by":"publisher","unstructured":"Elaine Barker and Allen Roginsky. 2019. Transitioning the use of cryptographic algorithms and key lengths. 10.6028\/NIST.SP.800-131Ar2","DOI":"10.6028\/NIST.SP.800-131Ar2"},{"key":"e_1_3_3_3_10_2","doi-asserted-by":"crossref","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology 3 2 (2006) 77\u2013101.","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_3_3_11_2","doi-asserted-by":"publisher","DOI":"10.1037\/13620-004"},{"key":"e_1_3_3_3_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-5251-4_103"},{"key":"e_1_3_3_3_13_2","first-page":"189","volume-title":"Usability evaluation in industry","author":"Brooke John","year":"1996","unstructured":"John Brooke. 1996. SUS - a quick and dirty usability scale. In Usability evaluation in industry, Patrick\u00a0W. Jordan, Bruce Thomas, Bernard\u00a0A. Weerdmeester, and Ian\u00a0Lyall McClelland (Eds.). Taylor and Francis, Bristol, PA and London and \u00a91996, 189\u2013194."},{"key":"e_1_3_3_3_14_2","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik. 2024. Technische Richtlinie 02102-1: Kryptographische Verfahren: Empfehlungen und Schl\u00fcssell\u00e4ngen. https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Publikationen\/TechnischeRichtlinien\/TR02102\/BSI-TR-02102.pdf"},{"key":"e_1_3_3_3_15_2","doi-asserted-by":"crossref","unstructured":"Deanna\u00a0D Caputo Shari\u00a0Lawrence Pfleeger M\u00a0Angela Sasse Paul Ammann Jeff Offutt and Lin Deng. 2016. Barriers to usable security? Three organizational case studies. IEEE Security & Privacy 14 5 (2016) 22\u201332.","DOI":"10.1109\/MSP.2016.95"},{"key":"e_1_3_3_3_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev51306.2021.00023"},{"key":"e_1_3_3_3_17_2","unstructured":"Jeremy Clark P.\u00a0C. van Oorschot Scott Ruoti Kent Seamons and Daniel Zappala. 2018. SoK: Securing Email \u2013 A Stakeholder-Based Analysis (Extended Version). http:\/\/arxiv.org\/pdf\/1804.07706v3"},{"key":"e_1_3_3_3_18_2","unstructured":"The\u00a0Qt Company. 2024. The Qt Help Framework. https:\/\/doc.qt.io\/qt-6\/qthelp-framework.html."},{"key":"e_1_3_3_3_19_2","unstructured":"MDN contributors. 2024. CSS: Cascading Style Sheets. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/CSS."},{"key":"e_1_3_3_3_20_2","unstructured":"OBS\u00a0Studio Contributors. 2024. OBS Studio. https:\/\/obsproject.com\/."},{"key":"e_1_3_3_3_21_2","doi-asserted-by":"publisher","DOI":"10.1017\/9781316480748.012"},{"key":"e_1_3_3_3_22_2","unstructured":"H\u00fclya Evkan Norman Lahr Ruben Niederhagen Richard Petri Andreas Poller Philipp Roskosch and Michael Tr\u00f6ger. 2020. Security Evaluation of VeraCrypt. https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/EN\/BSI\/Publications\/Studies\/Veracrypt\/Veracrypt.pdf"},{"key":"e_1_3_3_3_23_2","first-page":"7213","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Fischer Konstantin","year":"2024","unstructured":"Konstantin Fischer, Ivana Trummov\u00e1, Phillip Gajland, Yasemin Acar, Sascha Fahl, and Angela Sasse. 2024. The Challenges of Bringing Cryptography from Research Papers to Products: Results from an Interview Study with Experts. In 33rd USENIX Security Symposium (USENIX Security 24). USENIX Association, Philadelphia, PA, 7213\u20137230. https:\/\/www.usenix.org\/conference\/usenixsecurity24\/presentation\/fischer"},{"key":"e_1_3_3_3_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIS.2019.00014"},{"key":"e_1_3_3_3_25_2","doi-asserted-by":"publisher","unstructured":"Thomas Franke Christiane Attig and Daniel Wessel. 2019. A Personal Resource for Technology Interaction: Development and Validation of the Affinity for Technology Interaction (ATI) Scale. International Journal of Human\u2013Computer Interaction 35 6 (2019) 456\u2013467. 10.1080\/10447318.2018.1456150","DOI":"10.1080\/10447318.2018.1456150"},{"key":"e_1_3_3_3_26_2","unstructured":"Pius Ganter. 2020. A new VeraCrypt Interface? https:\/\/sourceforge.net\/p\/veracrypt\/discussion\/features\/thread\/0158a0194f\/."},{"key":"e_1_3_3_3_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073003"},{"key":"e_1_3_3_3_28_2","unstructured":"Github. 2024. VeraCrypt GitHub Page. https:\/\/github.com\/veracrypt\/VeraCrypt\/."},{"key":"e_1_3_3_3_29_2","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-63b"},{"key":"e_1_3_3_3_30_2","doi-asserted-by":"crossref","unstructured":"Matthew Green and Matthew Smith. 2016. Developers are not the enemy!: The need for usable security apis. IEEE Security & Privacy 14 5 (2016) 40\u201346.","DOI":"10.1109\/MSP.2016.111"},{"key":"e_1_3_3_3_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435360"},{"key":"e_1_3_3_3_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833756"},{"key":"e_1_3_3_3_33_2","doi-asserted-by":"publisher","DOI":"10.5555\/1267549.1267568"},{"key":"e_1_3_3_3_34_2","unstructured":"Author hidden\u00a0for privacy. 2018. Veracrypt requesting USB for rescue Disk. https:\/\/sourceforge.net\/p\/veracrypt\/discussion\/technical\/thread\/478194aa\/."},{"key":"e_1_3_3_3_35_2","unstructured":"Author hidden\u00a0for privacy. 2018. Veracrypt rescue disk image needed. https:\/\/sourceforge.net\/p\/veracrypt\/discussion\/technical\/thread\/178c3814\/."},{"key":"e_1_3_3_3_36_2","unstructured":"Author hidden\u00a0for privacy. 2019. Cannot create USB Rescue Disk. https:\/\/sourceforge.net\/p\/veracrypt\/discussion\/general\/thread\/b2d9f4288f\/."},{"key":"e_1_3_3_3_37_2","unstructured":"Author hidden\u00a0for privacy. 2019. is it dangerous to have your rescue disk laying around? https:\/\/github.com\/veracrypt\/VeraCrypt\/issues\/414#issuecomment-462180117."},{"key":"e_1_3_3_3_38_2","unstructured":"Author hidden\u00a0for privacy. 2022. Edits for Windows Compiling Guidelines. https:\/\/github.com\/veracrypt\/VeraCrypt\/issues\/970."},{"key":"e_1_3_3_3_39_2","unstructured":"Author hidden\u00a0for privacy. 2022. No way to verify that the published executable does not contain any backdoors? https:\/\/github.com\/veracrypt\/VeraCrypt\/issues\/1127."},{"key":"e_1_3_3_3_40_2","unstructured":"Author hidden\u00a0for privacy. 2023. Signing with me EV code. https:\/\/github.com\/veracrypt\/VeraCrypt\/issues\/1242."},{"key":"e_1_3_3_3_41_2","unstructured":"Author hidden\u00a0for privacy. 2023. VeraCrypt: Open source disk encryption with strong security for the Paranoid. https:\/\/sourceforge.net\/projects\/veracrypt\/."},{"key":"e_1_3_3_3_42_2","unstructured":"Author hidden\u00a0for privacy. 2024. Build and run\/debug VeraCrypt on Visual Studio 2010. https:\/\/github.com\/veracrypt\/VeraCrypt\/issues\/1413."},{"key":"e_1_3_3_3_43_2","unstructured":"Andreas Hinderks Martin Schrepp and J\u00f6rg Thomaschewski. 2008. User Experience Questionaire (UEQ). https:\/\/www.ueq-online.org\/."},{"key":"e_1_3_3_3_44_2","unstructured":"Idrix. 2022. Random Number Generator: VeraCrypt Documentation. https:\/\/veracrypt.eu\/en\/Random%20Number%20Generator.html"},{"key":"e_1_3_3_3_45_2","unstructured":"Apple Inc.2024. Protect data on your Mac with FileVault. https:\/\/support.apple.com\/guide\/mac-help\/protect-data-on-your-mac-with-filevault-mh11785\/mac"},{"key":"e_1_3_3_3_46_2","unstructured":"Borsato Ivano. 2024. EasyScreenCast. https:\/\/github.com\/EasyScreenCast\/EasyScreenCast."},{"key":"e_1_3_3_3_47_2","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2445102"},{"key":"e_1_3_3_3_48_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89350-9_6"},{"key":"e_1_3_3_3_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.41"},{"key":"e_1_3_3_3_50_2","doi-asserted-by":"publisher","DOI":"10.1016\/B978-044481862-1.50096-0"},{"key":"e_1_3_3_3_51_2","doi-asserted-by":"publisher","unstructured":"Nora McDonald Sarita Schoenebeck and Andrea Forte. 2019. Reliability and Inter-rater Reliability in Qualitative Research: Norms and Guidelines for CSCW and HCI Practice. Proceedings of the ACM on Human-Computer Interaction 3 CSCW (Nov. 2019) 1\u201323. 10.1145\/3359174","DOI":"10.1145\/3359174"},{"key":"e_1_3_3_3_52_2","unstructured":"Microsoft. 2021. Advanced troubleshooting for Windows boot problems. https:\/\/learn.microsoft.com\/en-us\/troubleshoot\/windows-client\/performance\/windows-boot-issues-troubleshooting."},{"key":"e_1_3_3_3_53_2","unstructured":"Microsoft. 2024. BitLocker overview. https:\/\/learn.microsoft.com\/en-us\/windows\/security\/operating-system-security\/data-protection\/bitlocker\/"},{"key":"e_1_3_3_3_54_2","unstructured":"Microsoft. 2024. Microsoft HTML Help Downloads. https:\/\/learn.microsoft.com\/en-us\/previous-versions\/windows\/desktop\/htmlhelp\/microsoft-html-help-downloads."},{"key":"e_1_3_3_3_55_2","unstructured":"Microsoft. 2024. What is the Microsoft Help Viewer? https:\/\/learn.microsoft.com\/en-us\/visualstudio\/help-viewer\/overview."},{"key":"e_1_3_3_3_56_2","series-title":"(FAST\u201912)","first-page":"12","volume-title":"Proceedings of the 10th USENIX Conference on File and Storage Technologies","author":"Min Changwoo","year":"2012","unstructured":"Changwoo Min, Kangnyeon Kim, Hyunjin Cho, Sang-Won Lee, and Young\u00a0Ik Eom. 2012. SFS: random write considered harmful in solid state drives. In Proceedings of the 10th USENIX Conference on File and Storage Technologies (San Jose, CA) (FAST\u201912). USENIX Association, USA, 12."},{"key":"e_1_3_3_3_57_2","doi-asserted-by":"publisher","unstructured":"Kristin D.\u00a0Hansen Morten\u00a0Hertzum and Hans\u00a0H.K. Andersen. 2009. Scrutinising usability evaluation: does thinking aloud affect behaviour and mental workload? Behaviour & Information Technology 28 2 (2009) 165\u2013181. 10.1080\/01449290701773842 arXiv:10.1080\/01449290701773842","DOI":"10.1080\/01449290701773842"},{"key":"e_1_3_3_3_58_2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134082"},{"key":"e_1_3_3_3_59_2","doi-asserted-by":"publisher","unstructured":"David\u00a0M. Nichols and Michael\u00a0B. Twidale. 2006. Usability processes in open source projects. Software Process: Improvement and Practice 11 2 (2006) 149\u2013162. 10.1002\/spip.256 arXiv:https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/spip.256","DOI":"10.1002\/spip.256"},{"key":"e_1_3_3_3_60_2","volume-title":"Usability engineering (1. print ed.)","author":"Nielsen Jakob","year":"1993","unstructured":"Jakob Nielsen. 1993. Usability engineering (1. print ed.). AP Professional, Boston, Mass."},{"key":"e_1_3_3_3_61_2","doi-asserted-by":"publisher","DOI":"10.1145\/3171533.3171539"},{"key":"e_1_3_3_3_62_2","unstructured":"Felix Reichmann. 2019. Added creation of Rescue USB Drive. https:\/\/github.com\/veracrypt\/VeraCrypt\/pull\/486."},{"key":"e_1_3_3_3_63_2","unstructured":"Felix Reichmann. 2019. German translation. https:\/\/github.com\/veracrypt\/VeraCrypt\/pull\/491."},{"key":"e_1_3_3_3_64_2","unstructured":"Felix Reichmann. 2021. Introduction of a more sophisticated user interface. https:\/\/github.com\/veracrypt\/VeraCrypt\/pull\/863."},{"key":"e_1_3_3_3_65_2","unstructured":"Felix Reichmann. 2022. Documentation overwork. https:\/\/github.com\/veracrypt\/VeraCrypt\/pull\/953."},{"key":"e_1_3_3_3_66_2","unstructured":"Felix Reichmann. 2022. New sys enc wizard. https:\/\/github.com\/veracrypt\/VeraCrypt\/pull\/957."},{"key":"e_1_3_3_3_67_2","doi-asserted-by":"publisher","unstructured":"Scott Ruoti Jeff Andersen Luke Dickinson Scott Heidbrink Tyler Monson Mark O\u2019neill Ken Reese Brad Spendlove Elham Vaziripour Justin Wu Daniel Zappala and Kent Seamons. 2019. A Usability Study of Four Secure Email Tools Using Paired Participants. ACM Transactions on Privacy and Security 22 2 (2019) 1\u201333. 10.1145\/3313761","DOI":"10.1145\/3313761"},{"key":"e_1_3_3_3_68_2","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501609"},{"key":"e_1_3_3_3_69_2","unstructured":"Martin Schrepp Jessica Kollmorgen and J\u00f6rg Thomaschewski. 2023. A Comparison of SUS UMUX-LITE and UEQ-S. J. User Exper. 18 2 (June 2023) 86\u2013104."},{"key":"e_1_3_3_3_70_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23522-2"},{"key":"e_1_3_3_3_71_2","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/EASE2010.12"},{"key":"e_1_3_3_3_72_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2019.00021"},{"key":"e_1_3_3_3_73_2","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753476"},{"key":"e_1_3_3_3_74_2","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568315"},{"key":"e_1_3_3_3_75_2","unstructured":"VeraCrypt. 2024. VeraCrypt Rescue Disk. https:\/\/veracrypt.eu\/en\/VeraCrypt%20Rescue%20Disk.html."},{"key":"e_1_3_3_3_76_2","unstructured":"VeraCrypt. 2024. VeraCrypt Website. https:\/\/veracrypt.fr\/en\/Home.html."},{"key":"e_1_3_3_3_77_2","doi-asserted-by":"publisher","unstructured":"Victoria\u00a0Clarke Virginia\u00a0Braun and Nikki Hayfield. 2022. \u2018A starting point for your journey not a map\u2019: Nikki Hayfield in conversation with Virginia Braun and Victoria Clarke about thematic analysis. Qualitative Research in Psychology 19 2 (2022) 424\u2013445. 10.1080\/14780887.2019.1670765 arXiv:10.1080\/14780887.2019.1670765","DOI":"10.1080\/14780887.2019.1670765"},{"key":"e_1_3_3_3_78_2","unstructured":"W3Techs. 2024. Usage statistics of CSS for websites. https:\/\/w3techs.com\/technologies\/details\/ce-css."},{"key":"e_1_3_3_3_79_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE52982.2021.00061"},{"key":"e_1_3_3_3_80_2","doi-asserted-by":"publisher","unstructured":"Wenting Wang Jinghui Cheng and Jin\u00a0L.C. Guo. 2022. How Do Open Source Software Contributors Perceive and Address Usability?: Valued Factors Practices and Challenges. IEEE Software 39 1 (2022) 76\u201383. 10.1109\/MS.2020.3009514","DOI":"10.1109\/MS.2020.3009514"},{"key":"e_1_3_3_3_81_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833686"},{"key":"e_1_3_3_3_82_2","series-title":"(SSYM\u201999)","first-page":"14","volume-title":"Proceedings of the 8th Conference on USENIX Security Symposium - Volume 8","author":"Whitten Alma","year":"1999","unstructured":"Alma Whitten and J.\u00a0D. Tygar. 1999. Why Johnny can\u2019t encrypt: a usability evaluation of PGP 5.0. In Proceedings of the 8th Conference on USENIX Security Symposium - Volume 8(SSYM\u201999). USENIX Association, USA, 14."}],"event":{"name":"CHI 2025: CHI Conference on Human Factors in Computing Systems","location":"Yokohama Japan","acronym":"CHI '25","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3713983","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706598.3713983","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:57:23Z","timestamp":1750298243000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3713983"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,25]]},"references-count":81,"alternative-id":["10.1145\/3706598.3713983","10.1145\/3706598"],"URL":"https:\/\/doi.org\/10.1145\/3706598.3713983","relation":{},"subject":[],"published":{"date-parts":[[2025,4,25]]},"assertion":[{"value":"2025-04-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}