{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:57:04Z","timestamp":1776110224906,"version":"3.50.1"},"reference-count":259,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2022,6,9]],"date-time":"2022-06-09T00:00:00Z","timestamp":1654732800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"FCT - Funda\u00e7\u00e3o para a Ciencia e a Tecnologia","award":["2020.04430"],"award-info":[{"award-number":["2020.04430"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Comput. Educ."],"published-print":{"date-parts":[[2022,9,30]]},"abstract":"<jats:p>Practical programming competencies are critical to the success in computer science (CS) education and go-to-market of fresh graduates. Acquiring the required level of skills is a long journey of discovery, trial and error, and optimization seeking through a broad range of programming activities that learners must perform themselves. It is not reasonable to consider that teachers could evaluate all attempts that the average learner should develop multiplied by the number of students enrolled in a course, much less in a timely, deep, and fair fashion. Unsurprisingly, exploring the formal structure of programs to automate the assessment of certain features has long been a hot topic among CS education practitioners. Assessing a program is considerably more complex than asserting its functional correctness, as the proliferation of tools and techniques in the literature over the past decades indicates. Program efficiency, behavior, and readability, among many other features, assessed either statically or dynamically, are now also relevant for automatic evaluation. The outcome of an evaluation evolved from the primordial Boolean values to information about errors and tips on how to advance, possibly taking into account similar solutions. This work surveys the state of the art in the automated assessment of CS assignments, focusing on the supported types of exercises, security measures adopted, testing techniques used, type of feedback produced, and the information they offer the teacher to understand and optimize learning. A new era of automated assessment, capitalizing on static analysis techniques and containerization, has been identified. Furthermore, this review presents several other findings from the conducted review, discusses the current challenges of the field, and proposes some future research directions.<\/jats:p>","DOI":"10.1145\/3513140","type":"journal-article","created":{"date-parts":[[2022,2,24]],"date-time":"2022-02-24T17:04:53Z","timestamp":1645722293000},"page":"1-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":219,"title":["Automated Assessment in Computer Science Education: A State-of-the-Art Review"],"prefix":"10.1145","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0394-0527","authenticated-orcid":false,"given":"Jos\u00e9 Carlos","family":"Paiva","sequence":"first","affiliation":[{"name":"CRACS-INESC TEC and DCC-FCUP, Porto, Portugal"}]},{"given":"Jos\u00e9 Paulo","family":"Leal","sequence":"additional","affiliation":[{"name":"CRACS-INESC TEC and DCC-FCUP, Porto, Portugal"}]},{"given":"\u00c1lvaro","family":"Figueira","sequence":"additional","affiliation":[{"name":"CRACS-INESC TEC and DCC-FCUP, Porto, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2022,6,9]]},"reference":[{"key":"e_1_3_1_2_2"},{"key":"e_1_3_1_3_2"},{"key":"e_1_3_1_4_2"},{"key":"e_1_3_1_5_2","unstructured":"Alex Aiken. 2021. MOSS: A System for Detecting Software Similarity. Retrieved September 22 2021 from https:\/\/theory.stanford.edu\/~aiken\/moss\/."},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.28945\/300"},{"key":"e_1_3_1_7_2"},{"key":"e_1_3_1_8_2","unstructured":"Hasan Alkhatib Paolo Faraboschi Eitan Frachtenberg Hironori Kasahara Danny Lange Phil Laplante Arif Merchant Dejan Milojicic and Karsten Schwan. 2021. IEEE Computer Society 2022 Report. Retrieved September 22 2021 from https:\/\/www.computer.org\/publications\/tech-news\/trends\/2022-report."},{"key":"e_1_3_1_9_2"},{"key":"e_1_3_1_10_2"},{"key":"e_1_3_1_11_2"},{"key":"e_1_3_1_12_2"},{"key":"e_1_3_1_13_2"},{"key":"e_1_3_1_14_2"},{"key":"e_1_3_1_15_2"},{"key":"e_1_3_1_16_2"},{"key":"e_1_3_1_17_2"},{"key":"e_1_3_1_18_2"},{"key":"e_1_3_1_19_2"},{"key":"e_1_3_1_20_2"},{"key":"e_1_3_1_21_2"},{"key":"e_1_3_1_22_2"},{"key":"e_1_3_1_23_2"},{"key":"e_1_3_1_24_2"},{"key":"e_1_3_1_25_2"},{"issue":"2","key":"e_1_3_1_26_2","first-page":"16","article-title":"Simple smalltalk testing: With patterns","volume":"4","author":"Beck Kent","year":"1994","unstructured":"Kent Beck. 1994. Simple smalltalk testing: With patterns. Smalltalk Report 4, 2 (1994), 16\u201318.","journal-title":"Smalltalk Report"},{"key":"e_1_3_1_27_2"},{"key":"e_1_3_1_28_2"},{"key":"e_1_3_1_29_2"},{"key":"e_1_3_1_30_2"},{"key":"e_1_3_1_31_2"},{"key":"e_1_3_1_32_2"},{"key":"e_1_3_1_33_2"},{"key":"e_1_3_1_34_2"},{"key":"e_1_3_1_35_2"},{"key":"e_1_3_1_36_2","volume-title":"Teaching for Quality Learning at University: What the Student Does? (4th. ed.)","author":"Biggs John","year":"2011","unstructured":"John Biggs and Catherine Tang. 2011. Teaching for Quality Learning at University: What the Student Does? (4th. ed.). Maidenhead, Berkshire, UK."},{"key":"e_1_3_1_37_2"},{"key":"e_1_3_1_38_2"},{"key":"e_1_3_1_39_2"},{"key":"e_1_3_1_40_2","volume-title":"Feedback in Higher and Professional Education: Understanding It and Doing It Well.","author":"Boud David","year":"2013","unstructured":"David Boud and Elizabeth Molloy (Eds.). 2013. Feedback in Higher and Professional Education: Understanding It and Doing It Well.Routledge, London, UK."},{"key":"e_1_3_1_41_2"},{"key":"e_1_3_1_42_2"},{"key":"e_1_3_1_43_2"},{"key":"e_1_3_1_44_2"},{"key":"e_1_3_1_45_2"},{"key":"e_1_3_1_46_2"},{"key":"e_1_3_1_47_2"},{"key":"e_1_3_1_48_2"},{"key":"e_1_3_1_49_2"},{"key":"e_1_3_1_50_2","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1007\/978-3-030-51965-0_21","volume-title":"Intelligent Algorithms in Software Engineering","author":"Chen Di","year":"2020","unstructured":"Di Chen, Hui Li, Mei Chen, Zhenyu Dai, Huanjun Li, Ming Zhu, and Jian Zhang. 2020. PeBAO: A performance bottleneck analysis and optimization framework in concurrent environments. In Intelligent Algorithms in Software Engineering, Radek Silhavy (Ed.). Springer International, Cham, Switzerland, 248\u2013260."},{"key":"e_1_3_1_51_2"},{"key":"e_1_3_1_52_2"},{"key":"e_1_3_1_53_2"},{"key":"e_1_3_1_54_2"},{"key":"e_1_3_1_55_2"},{"key":"e_1_3_1_56_2"},{"key":"e_1_3_1_57_2","volume-title":"Generation CS: Computer Science Undergraduate Enrollments Surge since 2006","author":"Association Computing Research","year":"2017","unstructured":"Computing Research Association. 2017. Generation CS: Computer Science Undergraduate Enrollments Surge since 2006. Computing Research Association. https:\/\/cra.org\/data\/Generation-CS\/."},{"key":"e_1_3_1_58_2"},{"key":"e_1_3_1_59_2"},{"key":"e_1_3_1_60_2"},{"key":"e_1_3_1_61_2"},{"key":"e_1_3_1_62_2"},{"key":"e_1_3_1_63_2","unstructured":"Rajdeep Das Umair Z. Ahmed Amey Karkare and Sumit Gulwani. 2016. Prutor: A system for tutoring CS1 and collecting student programs for analysis. arXiv:1608.03828 [cs.CY] (2016)."},{"key":"e_1_3_1_64_2"},{"key":"e_1_3_1_65_2"},{"key":"e_1_3_1_66_2"},{"key":"e_1_3_1_67_2"},{"key":"e_1_3_1_68_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.edurev.2006.02.001"},{"key":"e_1_3_1_69_2"},{"key":"e_1_3_1_70_2"},{"key":"e_1_3_1_71_2"},{"key":"e_1_3_1_72_2"},{"key":"e_1_3_1_73_2"},{"key":"e_1_3_1_74_2"},{"key":"e_1_3_1_75_2"},{"key":"e_1_3_1_76_2"},{"key":"e_1_3_1_77_2"},{"key":"e_1_3_1_78_2"},{"key":"e_1_3_1_79_2","first-page":"553","volume-title":"Information Technologies at School","author":"Fori\u0161ek Michal","year":"2006","unstructured":"Michal Fori\u0161ek. 2006. Security of programming contest systems. In Information Technologies at School, Valentina Dagiene and Roland Mittermeir (Eds.). 2nd International Conference on Informatics in Secondary Schools: Evolution and Perspectives, Vilnius, Lithuania, 553\u2013563."},{"key":"e_1_3_1_80_2"},{"key":"e_1_3_1_81_2","volume-title":"Appium: Mobile app automation made awesome","author":"Foundation J. S.","year":"2020","unstructured":"J. S. Foundation. 2020. Appium: Mobile app automation made awesome. JS Foundation. Retrieved August 31, 2021 from http:\/\/appium.io\/."},{"key":"e_1_3_1_82_2"},{"key":"e_1_3_1_83_2"},{"issue":"1","key":"e_1_3_1_84_2","first-page":"38","article-title":"A Java programming learning assistant system using test-driven development method","volume":"40","author":"Funabiki Nobuo","year":"2013","unstructured":"Nobuo Funabiki, Yukiko Matsushima, Toru Nakanishi, Kan Watanabe, and Noriki Amano. 2013. A Java programming learning assistant system using test-driven development method. IAENG International Journal of Computer Science 40, 1 (2013), 38\u201346.","journal-title":"IAENG International Journal of Computer Science"},{"key":"e_1_3_1_85_2"},{"key":"e_1_3_1_86_2"},{"key":"e_1_3_1_87_2"},{"key":"e_1_3_1_88_2"},{"key":"e_1_3_1_89_2"},{"key":"e_1_3_1_90_2"},{"key":"e_1_3_1_91_2"},{"key":"e_1_3_1_92_2"},{"key":"e_1_3_1_93_2"},{"key":"e_1_3_1_94_2"},{"key":"e_1_3_1_95_2"},{"key":"e_1_3_1_96_2"},{"key":"e_1_3_1_97_2"},{"key":"e_1_3_1_98_2"},{"key":"e_1_3_1_99_2","series-title":"Computer Science library","volume-title":"Elements of Software Science","author":"Halstead Maurice Howard","year":"1977","unstructured":"Maurice Howard Halstead. 1977. Elements of Software Science. Computer Science library, Vol. 7. Elsevier, New York, NY. 77001321"},{"key":"e_1_3_1_100_2"},{"key":"e_1_3_1_101_2"},{"key":"e_1_3_1_102_2"},{"key":"e_1_3_1_103_2"},{"key":"e_1_3_1_104_2"},{"key":"e_1_3_1_105_2"},{"key":"e_1_3_1_106_2"},{"key":"e_1_3_1_107_2"},{"key":"e_1_3_1_108_2"},{"key":"e_1_3_1_109_2"},{"key":"e_1_3_1_110_2"},{"key":"e_1_3_1_111_2"},{"key":"e_1_3_1_112_2"},{"key":"e_1_3_1_113_2"},{"key":"e_1_3_1_114_2"},{"key":"e_1_3_1_115_2"},{"key":"e_1_3_1_116_2"},{"key":"e_1_3_1_117_2"},{"key":"e_1_3_1_118_2","volume-title":"Checkstyle","author":"Ivanov Roman","year":"2020","unstructured":"Roman Ivanov. 2020. Checkstyle. SourceForge. Retrieved August 31, 2021 from https:\/\/checkstyle.sourceforge.io\/."},{"key":"e_1_3_1_119_2"},{"key":"e_1_3_1_120_2"},{"key":"e_1_3_1_121_2"},{"key":"e_1_3_1_122_2"},{"key":"e_1_3_1_123_2"},{"key":"e_1_3_1_124_2"},{"key":"e_1_3_1_125_2"},{"key":"e_1_3_1_126_2"},{"key":"e_1_3_1_127_2"},{"key":"e_1_3_1_128_2"},{"key":"e_1_3_1_129_2"},{"key":"e_1_3_1_130_2"},{"key":"e_1_3_1_131_2"},{"key":"e_1_3_1_132_2"},{"key":"e_1_3_1_133_2"},{"key":"e_1_3_1_134_2"},{"key":"e_1_3_1_135_2"},{"key":"e_1_3_1_136_2"},{"key":"e_1_3_1_137_2"},{"key":"e_1_3_1_138_2"},{"key":"e_1_3_1_139_2"},{"key":"e_1_3_1_140_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61425-0_14"},{"key":"e_1_3_1_141_2"},{"key":"e_1_3_1_142_2"},{"key":"e_1_3_1_143_2"},{"key":"e_1_3_1_144_2"},{"key":"e_1_3_1_145_2"},{"key":"e_1_3_1_146_2"},{"key":"e_1_3_1_147_2"},{"key":"e_1_3_1_148_2"},{"key":"e_1_3_1_149_2"},{"key":"e_1_3_1_150_2"},{"key":"e_1_3_1_151_2"},{"key":"e_1_3_1_152_2"},{"key":"e_1_3_1_153_2"},{"key":"e_1_3_1_154_2"},{"key":"e_1_3_1_155_2"},{"key":"e_1_3_1_156_2"},{"key":"e_1_3_1_157_2"},{"key":"e_1_3_1_158_2"},{"key":"e_1_3_1_159_2"},{"key":"e_1_3_1_160_2"},{"key":"e_1_3_1_161_2"},{"key":"e_1_3_1_162_2"},{"key":"e_1_3_1_163_2"},{"key":"e_1_3_1_164_2"},{"key":"e_1_3_1_165_2"},{"key":"e_1_3_1_166_2"},{"key":"e_1_3_1_167_2","volume-title":"FindBugs\u2014Find bugs in Java programs","author":"Maryland University of","year":"2015","unstructured":"University of Maryland. 2015. FindBugs\u2014Find bugs in Java programs. SourceForge. Retrieved August 31, 2021 from http:\/\/findbugs.sourceforge.net\/."},{"key":"e_1_3_1_168_2"},{"key":"e_1_3_1_169_2"},{"key":"e_1_3_1_170_2"},{"key":"e_1_3_1_171_2"},{"key":"e_1_3_1_172_2"},{"key":"e_1_3_1_173_2"},{"key":"e_1_3_1_174_2"},{"key":"e_1_3_1_175_2"},{"key":"e_1_3_1_176_2"},{"key":"e_1_3_1_177_2"},{"key":"e_1_3_1_178_2"},{"key":"e_1_3_1_179_2"},{"key":"e_1_3_1_180_2"},{"key":"e_1_3_1_181_2"},{"key":"e_1_3_1_182_2"},{"key":"e_1_3_1_183_2"},{"key":"e_1_3_1_184_2"},{"key":"e_1_3_1_185_2"},{"key":"e_1_3_1_186_2","unstructured":"PMD. 2020. PMD Open Source Project. Retrieved August 31 2021 from https:\/\/pmd.github.io\/."},{"key":"e_1_3_1_187_2"},{"key":"e_1_3_1_188_2"},{"key":"e_1_3_1_189_2"},{"key":"e_1_3_1_190_2"},{"key":"e_1_3_1_191_2"},{"key":"e_1_3_1_192_2"},{"key":"e_1_3_1_193_2","first-page":"191","article-title":"Generating data-driven hints for open-ended programming.","volume":"9","author":"Price Thomas W.","year":"2016","unstructured":"Thomas W. Price, Yihuan Dong, and Tiffany Barnes. 2016. Generating data-driven hints for open-ended programming. International Educational Data Mining Society 9 (2016), 191\u2013198.","journal-title":"International Educational Data Mining Society"},{"key":"e_1_3_1_194_2"},{"key":"e_1_3_1_195_2"},{"key":"e_1_3_1_196_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-287-868-7_46"},{"key":"e_1_3_1_197_2"},{"key":"e_1_3_1_198_2","doi-asserted-by":"crossref","unstructured":"Khirulnizam Rahman and Md. Jan Nordin. 2007. A review on the static analysis approach in the automated programming assessment systems. In Proceedings of the 2007 National Conference on Programming . 1\u201315.","DOI":"10.1201\/9781420009187.ch2"},{"key":"e_1_3_1_199_2"},{"key":"e_1_3_1_200_2"},{"key":"e_1_3_1_201_2"},{"key":"e_1_3_1_202_2"},{"key":"e_1_3_1_203_2"},{"key":"e_1_3_1_204_2"},{"key":"e_1_3_1_205_2"},{"key":"e_1_3_1_206_2","volume-title":"EMMA: A free Java code coverage tool","author":"Roubtsov Vlad","year":"2006","unstructured":"Vlad Roubtsov. 2006. EMMA: A free Java code coverage tool. SourceForge. Retrieved August 31, 2021 from http:\/\/emma.sourceforge.net\/index.html."},{"key":"e_1_3_1_207_2"},{"key":"e_1_3_1_208_2","volume-title":"SonarQube","author":"A SonarSource S.","year":"2020","unstructured":"SonarSource S. A. 2020. SonarQube. SonarSource S.A. Retrieved August 31, 2021 from https:\/\/www.sonarqube.org\/."},{"key":"e_1_3_1_209_2"},{"key":"e_1_3_1_210_2"},{"key":"e_1_3_1_211_2","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1007\/978-3-030-61380-8_32","volume-title":"Intelligent Systems","author":"Silva Cl\u00f3vis Daniel Souza","year":"2020","unstructured":"Cl\u00f3vis Daniel Souza Silva, Leonardo Ferreira da Costa, Leonardo Sampaio Rocha, and Gerardo Vald\u00edsio Rodrigues Viana. 2020. KNN applied to PDG for source code similarity classification. In Intelligent Systems, Ricardo Cerri and Ronaldo C. Prati (Eds.). Springer, Cham, Switzerland, 471\u2013482."},{"key":"e_1_3_1_212_2"},{"key":"e_1_3_1_213_2","volume-title":"Secure Execution of Student Code","author":"Sims Ryan W.","year":"2012","unstructured":"Ryan W. Sims. 2012. Secure Execution of Student Code. Technical Report. Department of Computer Science, University of Maryland."},{"key":"e_1_3_1_214_2"},{"key":"e_1_3_1_215_2"},{"key":"e_1_3_1_216_2"},{"key":"e_1_3_1_217_2"},{"key":"e_1_3_1_218_2"},{"key":"e_1_3_1_219_2"},{"key":"e_1_3_1_220_2"},{"key":"e_1_3_1_221_2"},{"key":"e_1_3_1_222_2"},{"key":"e_1_3_1_223_2","volume-title":"Top 10 common database security issues","author":"Spencer David","year":"2014","unstructured":"David Spencer. 2014. Top 10 common database security issues. NCC Group. Retrieved December 23, 2020 from https:\/\/www.nccgroup.com\/uk\/about-us\/newsroom-and-events\/blogs\/2014\/july\/top-10-common-database-security-issues\/."},{"key":"e_1_3_1_224_2","unstructured":"SpotBugs. 2020. SpotBugs. Retrieved August 31 2021 from http:\/\/spotbugs.github.io\/."},{"key":"e_1_3_1_225_2","volume-title":"Top software failures in recent history","author":"Staff Computerworld UK","year":"2020","unstructured":"Computerworld UK Staff. 2020. Top software failures in recent history. Computerworld. Retrieved December 22, 2020 from https:\/\/www.computerworld.com\/article\/3412197\/top-software-failures-in-recent-history.html."},{"key":"e_1_3_1_226_2"},{"key":"e_1_3_1_227_2"},{"key":"e_1_3_1_228_2"},{"key":"e_1_3_1_229_2"},{"key":"e_1_3_1_230_2"},{"key":"e_1_3_1_231_2"},{"key":"e_1_3_1_232_2"},{"key":"e_1_3_1_233_2"},{"key":"e_1_3_1_234_2"},{"key":"e_1_3_1_235_2"},{"key":"e_1_3_1_236_2"},{"key":"e_1_3_1_237_2"},{"key":"e_1_3_1_238_2"},{"key":"e_1_3_1_239_2"},{"key":"e_1_3_1_240_2"},{"key":"e_1_3_1_241_2","volume-title":"A System for Automatically Grading Program Quality (Metrics, Software Metrics, Program Complexity)","author":"Verth Patricia Bylebyl Van","year":"1985","unstructured":"Patricia Bylebyl Van Verth. 1985. A System for Automatically Grading Program Quality (Metrics, Software Metrics, Program Complexity). Ph.D. Dissertation. State University of NewYork at Buffalo."},{"key":"e_1_3_1_242_2"},{"key":"e_1_3_1_243_2"},{"key":"e_1_3_1_244_2"},{"key":"e_1_3_1_245_2"},{"key":"e_1_3_1_246_2"},{"key":"e_1_3_1_247_2"},{"key":"e_1_3_1_248_2"},{"key":"e_1_3_1_249_2"},{"key":"e_1_3_1_250_2"},{"key":"e_1_3_1_251_2","volume-title":"Proceedings of the 2nd Workshop of the Learning and Teaching Support Network\u2014Information and Computer Science (TLAD\u201904)","author":"Waugh Kevin","year":"2004","unstructured":"Kevin Waugh, Pete Thomas, and Neil Smith. 2004. Toward the automated assessment of entity-relationship diagrams. In Proceedings of the 2nd Workshop of the Learning and Teaching Support Network\u2014Information and Computer Science (TLAD\u201904). 1\u20136. http:\/\/oro.open.ac.uk\/2455\/"},{"key":"e_1_3_1_252_2"},{"key":"e_1_3_1_253_2"},{"key":"e_1_3_1_254_2"},{"key":"e_1_3_1_255_2"},{"key":"e_1_3_1_256_2"},{"key":"e_1_3_1_257_2"},{"key":"e_1_3_1_258_2"},{"key":"e_1_3_1_259_2"},{"key":"e_1_3_1_260_2"}],"container-title":["ACM Transactions on Computing Education"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3513140","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3513140","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:28Z","timestamp":1750191148000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3513140"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,9]]},"references-count":259,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,9,30]]}},"alternative-id":["10.1145\/3513140"],"URL":"https:\/\/doi.org\/10.1145\/3513140","relation":{},"ISSN":["1946-6226","1946-6226"],"issn-type":[{"value":"1946-6226","type":"print"},{"value":"1946-6226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,9]]},"assertion":[{"value":"2021-02-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-06-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}