{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T18:43:21Z","timestamp":1748630601106,"version":"3.37.3"},"reference-count":46,"publisher":"Springer Fachmedien Wiesbaden GmbH","issue":"2","license":[{"start":{"date-parts":[[2023,3,20]],"date-time":"2023-03-20T00:00:00Z","timestamp":1679270400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,20]],"date-time":"2023-03-20T00:00:00Z","timestamp":1679270400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["HMD"],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1365\/s40702-023-00953-5","type":"journal-article","created":{"date-parts":[[2023,3,20]],"date-time":"2023-03-20T12:02:59Z","timestamp":1679313779000},"page":"437-457","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Nutzen und Grenzen von SSI f\u00fcr Verwaltung und \u00f6ffentliche Institutionen","Benefits and Limitations of SSI for Administration and Public Institutions"],"prefix":"10.1365","volume":"60","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1331-6517","authenticated-orcid":false,"given":"Ben","family":"Biedermann","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Stefan","family":"Handke","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Olivia","family":"J\u00fcrgenssen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Elizabeth","family":"Orta","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Claudia","family":"Schindler","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Robert","family":"Schr\u00f6der","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lukas","family":"Schroll","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7019-0212","authenticated-orcid":false,"given":"Frank","family":"Sonne","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"93","published-online":{"date-parts":[[2023,3,20]]},"reference":[{"key":"953_CR51","unstructured":"Allen C (2016) The Path to Self-Sovereign Identity. http:\/\/www.lifewithalacrity.com\/2016\/04\/the-path-to-self-soverereign-identity.html"},{"key":"953_CR1","doi-asserted-by":"publisher","DOI":"10.13140\/RG.2.2.30892.49281","volume-title":"Self-sovereign digital identity on the European blockchain services infrastructure","author":"P Altmann","year":"2020","unstructured":"Altmann\u00a0P, Rissanen\u00a0E (2020) Self-sovereign digital identity on the European blockchain services infrastructure https:\/\/doi.org\/10.13140\/RG.2.2.30892.49281"},{"key":"953_CR2","series-title":"Politik und Wirtschaft","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-55720-4","volume-title":"Digitalisierung im Spannungsfeld von Politik, Wirtschaft, Wissenschaft und Recht","year":"2018","unstructured":"B\u00e4r\u00a0C, Gr\u00e4dler\u00a0T, Mayr\u00a0R (Hrsg) (2018) Digitalisierung im Spannungsfeld von Politik, Wirtschaft, Wissenschaft und Recht. Politik und Wirtschaft, Bd. 1. Springer, Berlin Heidelberg https:\/\/doi.org\/10.1007\/978-3-662-55720-4"},{"key":"953_CR3","first-page":"221","volume-title":"Globalization and security","author":"C Blad","year":"2009","unstructured":"Blad\u00a0C (2009) The nation state. In: Fagan\u00a0GH, Munck\u00a0R (Hrsg) Globalization and security. Praeger, S\u00a0221\u2013238"},{"key":"953_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-531-18909-3","volume-title":"Verwaltungswissenschaft","author":"E Bohne","year":"2018","unstructured":"Bohne\u00a0E (2018) Verwaltungswissenschaft. Springer, Wiesbaden https:\/\/doi.org\/10.1007\/978-3-531-18909-3"},{"key":"953_CR5","unstructured":"Bundesministerium des Innern und f\u00fcr Heimat (2023a) Dashboard Digitale Verwaltung. https:\/\/dashboard.ozg-umsetzung.de. Zugegriffen: 21. Januar 2023"},{"key":"953_CR6","unstructured":"Bundesministerium des Innern und f\u00fcr Heimat (2023b) Onlinezugangsgesetz. https:\/\/www.onlinezugangsgesetz.de\/. Zugegriffen: 6. September 2022"},{"key":"953_CR7","unstructured":"Bundesministerium f\u00fcr Digitales und Verkehr (2022) Digitalstrategie Deutschland. https:\/\/www.digitalstrategie-deutschland.de\/medien\/. Zugegriffen: 6. September 2022"},{"key":"953_CR8","unstructured":"Bundesministerium f\u00fcr Wirtschaft und Klimaschutz (2023) Schaufenster Sichere Digitale Identit\u00e4ten. https:\/\/www.digitale-technologien.de\/DT\/Navigation\/DE\/ProgrammeProjekte\/AktuelleTechnologieprogramme\/Sichere_Digitale_Identitaeten\/sichere_digitale_ident.html. Zugegriffen: 21. Januar 2023"},{"key":"953_CR9","volume-title":"Aktueller Stand Digitale Identit\u00e4ten auf die Kleine Anfrage der Fraktion der CDU\/CSU(Drucksache 20\/1400\u2013)","author":"Bundesregierung","year":"2022","unstructured":"Bundesregierung (2022) Aktueller Stand Digitale Identit\u00e4ten auf die Kleine Anfrage der Fraktion der CDU\/CSU(Drucksache 20\/1400\u2013)"},{"key":"953_CR10","unstructured":"Curren S et al (2022) DIDComm Messaging v2.0 (Specification Nr. 2). Decentralised Identity Foundation (DIF). https:\/\/identity.foundation\/didcomm-messaging\/spec\/v2.0\/. Zugegriffen: 20. Januar 2023"},{"key":"953_CR11","series-title":"Bundesgesetzblatt, 1182","volume-title":"Bundesmeldegesetz","author":"Deutscher Bundestag","year":"2022","unstructured":"Deutscher Bundestag (2022a) Bundesmeldegesetz. Bundesgesetzblatt, 1182"},{"key":"953_CR12","series-title":"Bundesgesetzblatt, 1822","volume-title":"Geldw\u00e4schegesetz","author":"Deutscher Bundestag","year":"2022","unstructured":"Deutscher Bundestag (2022b) Geldw\u00e4schegesetz. Bundesgesetzblatt, 1822"},{"key":"953_CR13","volume-title":"SSI eIDAS Legal Report. How eIDAS can legally support digital identity and trustworthy DLT-based transactions in the Digital Single Market","author":"IA Domingo","year":"2020","unstructured":"Domingo\u00a0IA (2020) SSI eIDAS Legal Report. How eIDAS can legally support digital identity and trustworthy DLT-based transactions in the Digital Single Market. European Commission"},{"issue":"2","key":"953_CR14","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1365\/s40702-021-00711-5","volume":"58","author":"T Ehrlich","year":"2021","unstructured":"Ehrlich\u00a0T, Richter\u00a0D, Meisel\u00a0M, Anke\u00a0J (2021) Self-Sovereign Identity als Grundlage f\u00fcr universell einsetzbare digitale Identit\u00e4ten. HMD 58(2):247\u2013270. https:\/\/doi.org\/10.1365\/s40702-021-00711-5","journal-title":"HMD"},{"key":"953_CR15","unstructured":"ESMT \u2013 European School of Management and Technology GmbH. (2021, Oktober 18). Umfrage zu digitalen Identit\u00e4ten: viele Identit\u00e4ten, wenig professionelle Hilfsmittel, Vorrang f\u00fcr dezentrale L\u00f6sungen \u2013 Blogbeitrag der Begleitforschung zum Schaufensterprogramm \u201eSichere Digitale Identit\u00e4ten\u201c. Schaufenster Sichere Digitale Identit\u00e4ten Begleitforschung. https:\/\/digitale-identitaeten.de\/meinungsumfrage_zu_sicheren_digitalen_identitaeten\/. Zugegriffen: 6. September 2022"},{"key":"953_CR17","volume-title":"Report on the evaluation of Regulation (EU) No 910\/2014 on electronic identification and trust services for electronic transactions in the internal market (eIDAS) (Report Nr.\u00a0290)","author":"European Commission","year":"2021","unstructured":"European Commission, European Council (2021) Report on the evaluation of Regulation (EU) No 910\/2014 on electronic identification and trust services for electronic transactions in the internal market (eIDAS) (Report Nr.\u00a0290). European Union"},{"key":"953_CR16","unstructured":"European Comission (2022, Mai 9). Support to the implementation of the European Digital Identity Framework and the implementation of the Once Only System under the Single Digital Gateway Regulation. Support to the implementation of the European Digital Identity Framework and the implementation of the Once Only System under the Single Digital Gateway Regulation. https:\/\/ec.europa.eu\/info\/funding-tenders\/opportunities\/portal\/screen\/opportunities\/topic-details\/digital-2022-deploy-02-electronic-id. Zugegriffen: 6. September 2022"},{"key":"953_CR18","volume-title":"Regulation on electronic identification and trust services for electronic transactions in the internal market","author":"European Parliament","year":"2014","unstructured":"European Parliament (2014) Regulation on electronic identification and trust services for electronic transactions in the internal market. European Union, Br\u00fcssel"},{"key":"953_CR21","unstructured":"European Parliament, European Council (2016) Regulation EU 2016\/679 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation). 119, 1\u201388. https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj. Zugegriffen: 20. Januar 2023"},{"key":"953_CR22","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s11623-022-1556-0","volume":"46","author":"A Fiedler","year":"2022","unstructured":"Fiedler\u00a0A, Granc\u00a0F (2022) Nationale und europ\u00e4ische Sicht auf eIDAS 2.0 \u2013 Aufwand und Nutzen. Datenschutz Datensicherh 46:27\u201331. https:\/\/doi.org\/10.1007\/s11623-022-1556-0","journal-title":"Datenschutz Datensicherh"},{"issue":"5","key":"953_CR24","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1365\/s40702-021-00766-4","volume":"58","author":"M Heine","year":"2021","unstructured":"Heine\u00a0M, Wessel\u00a0D (2021) E\u2011Government und Datensouver\u00e4nit\u00e4t \u2013 Einblicke und L\u00f6sungsans\u00e4tze. HMD 58(5):1081\u20131091. https:\/\/doi.org\/10.1365\/s40702-021-00766-4","journal-title":"HMD"},{"key":"953_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-33755-1","volume-title":"Datensouver\u00e4nit\u00e4t: Governance-Ans\u00e4tze f\u00fcr den Gesundheitsbereich","author":"P Hummel","year":"2021","unstructured":"Hummel\u00a0P, Braun\u00a0M, Augsberg\u00a0S, von Ulmenstein\u00a0U, Dabrock\u00a0P (2021) Datensouver\u00e4nit\u00e4t: Governance-Ans\u00e4tze f\u00fcr den Gesundheitsbereich. Springer, Wiesbaden https:\/\/doi.org\/10.1007\/978-3-658-33755-1"},{"key":"953_CR26","doi-asserted-by":"publisher","DOI":"10.1515\/9783110278217.285","volume-title":"Allgemeines Verwaltungsrecht","author":"M Jestaedt","year":"2006","unstructured":"Jestaedt\u00a0M (2006) Dritter Abschnitt. Ma\u00dfst\u00e4be des Verwaltungshandelns. In: Erichsen\u00a0H\u2011U, Ehlers\u00a0D (Hrsg) Allgemeines Verwaltungsrecht. De Gruyter, https:\/\/doi.org\/10.1515\/9783110278217.285"},{"key":"953_CR27","doi-asserted-by":"publisher","first-page":"15","DOI":"10.5771\/9783845299617-15","volume-title":"Daten als Handelsware: Zur verfassungskonformen Ausgestaltung des Datenrechts nach dem Vorbild des Immaterialg\u00fcterrechts","author":"J J\u00f6ns","year":"2019","unstructured":"J\u00f6ns\u00a0J (2019) Teil I: Einf\u00fchrung in den Untersuchungsgegenstand. In: Daten als Handelsware: Zur verfassungskonformen Ausgestaltung des Datenrechts nach dem Vorbild des Immaterialg\u00fcterrechts, 1.\u00a0Aufl. Nomos, S\u00a015\u201357 https:\/\/doi.org\/10.5771\/9783845299617-15","edition":"1"},{"key":"953_CR28","volume-title":"User centric identity management","author":"A Josang","year":"2005","unstructured":"Josang\u00a0A, Pope\u00a0S (2005) User centric identity management. CERT Asia Pacific information technology security conference, 77."},{"key":"953_CR29","volume-title":"Design Thinking: die agile Innovations-Strategie","author":"A Kerguenne","year":"2017","unstructured":"Kerguenne\u00a0A, Schaefer\u00a0H, Taherivand\u00a0A (2017) Design Thinking: die agile Innovations-Strategie, 1.\u00a0Aufl. Haufe-Lexware","edition":"1"},{"key":"953_CR30","volume-title":"Proceedings of the 12th Scandinavian conference on information systems","author":"G Laatikainen","year":"2021","unstructured":"Laatikainen\u00a0G, Kolehmainen\u00a0T, Abrahamsson\u00a0P (2021) Self-sovereign identity ecosystems: benefits and challenges. In: Parmiggiani\u00a0E, Kempton\u00a0A, Mikalef\u00a0P (Hrsg) Proceedings of the 12th Scandinavian conference on information systems, Bd. 1. Association for Information Systems,"},{"key":"953_CR32","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-658-22503-2_9","volume-title":"Schriften zur Organisation 1","author":"N Luhmann","year":"2018","unstructured":"Luhmann\u00a0N (2018) Kann die Verwaltung wirtschaftlich handeln? In: Lukas\u00a0E, Tacke\u00a0V (Hrsg) Schriften zur Organisation 1. Springer, Wiesbaden, S\u00a0111\u2013134 https:\/\/doi.org\/10.1007\/978-3-658-22503-2_9"},{"key":"953_CR33","doi-asserted-by":"publisher","DOI":"10.1017\/9781316882665","volume-title":"Theory and practice in policy analysis: including applications in science and technology","author":"MG Morgan","year":"2017","unstructured":"Morgan\u00a0MG (2017) Theory and practice in policy analysis: including applications in science and technology, 1.\u00a0Aufl. University Press, Cambridge https:\/\/doi.org\/10.1017\/9781316882665","edition":"1"},{"key":"953_CR53","unstructured":"Neosfer GmbH (2022) IDunion gibt erfolgreiche Gr\u00fcndung einer Europ\u00e4ischen Genossenschaft bekannt. https:\/\/idunion.org\/2022\/08\/11\/idunion-gibt-erfolgreiche-gruendung-einer-europaeischen-genossenschaft-bekannt\/"},{"key":"953_CR34","doi-asserted-by":"publisher","DOI":"10.2824\/8646","volume-title":"Digital identity : leveraging the SSI concept to build trust","author":"E Nikolouzou","year":"2022","unstructured":"Nikolouzou\u00a0E, Paggio\u00a0V, Dekker\u00a0M (2022) Digital identity : leveraging the SSI concept to build trust. Publications Office of the European Union https:\/\/doi.org\/10.2824\/8646"},{"key":"953_CR37","volume-title":"Self-sovereign identity. Decentralized digital identity and verifiable credentials","author":"A Preuschkat","year":"2021","unstructured":"Preuschkat\u00a0A, Reed\u00a0D (2021) Self-sovereign identity. Decentralized digital identity and verifiable credentials Bd. 1. Manning"},{"key":"953_CR39","unstructured":"PricewaterhouseCoopers (2021) PwC-Studie Der Online-Ausweis auf dem Smartphone und die digitale Brieftasche. PwC. https:\/\/www.pwc.de\/de\/finanzdienstleistungen\/der-online-ausweis-auf-dem-smartphone-und-die-digitale-brieftasche.html. Zugegriffen: 3. Januar 2023"},{"key":"953_CR40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-31980-9","volume-title":"Digitale Transformation von Gesch\u00e4ftsmodellen: Grundlagen, Instrumente und Best Practices","year":"2021","unstructured":"Schallmo\u00a0DRA, Rusnjak\u00a0A, Anzengruber\u00a0J, Werani\u00a0T, Lang\u00a0K (Hrsg) (2021) Digitale Transformation von Gesch\u00e4ftsmodellen: Grundlagen, Instrumente und Best Practices. Springer, Wiesbaden https:\/\/doi.org\/10.1007\/978-3-658-31980-9"},{"issue":"5","key":"953_CR41","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1002\/jsc.2150","volume":"26","author":"V Shermin","year":"2017","unstructured":"Shermin\u00a0V (2017) Disrupting governance with blockchains and smart contracts. Strateg Chang 26(5):499\u2013509. https:\/\/doi.org\/10.1002\/jsc.2150","journal-title":"Strateg Chang"},{"key":"953_CR43","series-title":"arXiv","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1907.02143","volume-title":"Key event receipt infrastructure (KERI)","author":"SM Smith","year":"2019","unstructured":"Smith\u00a0SM (2019) Key event receipt infrastructure (KERI). arXiv. https:\/\/doi.org\/10.48550\/ARXIV.1907.02143"},{"key":"953_CR42","unstructured":"Smith S, Cunningham C, Feairheller P (2021) The did:keri Method v0.1: A DID Method for KERI Identifiers (0.1). Decentralised Identity Foundation (DIF). https:\/\/identity.foundation\/keri\/did_methods\/. Zugegriffen: 20. Januar 2023"},{"key":"953_CR52","unstructured":"Sovrin Foundation (2020) Sovrin Foundation and Trust over IP Foundation Building a Trustworthy Internet for All. https:\/\/sovrin.org\/sovrin-foundation-and-trust-over-ip-foundation-building-a-trustworthy-internet-for-all\/"},{"issue":"6","key":"953_CR44","doi-asserted-by":"publisher","first-page":"817","DOI":"10.1080\/13501763.2013.781818","volume":"20","author":"P Stephenson","year":"2013","unstructured":"Stephenson\u00a0P (2013) Twenty years of multi-level governance: \u2018where does it come from? What is it? Where is it going? J\u00a0Eur Public Policy 20(6):817\u2013837. https:\/\/doi.org\/10.1080\/13501763.2013.781818","journal-title":"J Eur Public Policy"},{"key":"953_CR45","volume-title":"The inevitable rise of self-sovereign identity","author":"A Tobin","year":"2016","unstructured":"Tobin\u00a0A, Reed\u00a0D (2016) The inevitable rise of self-sovereign identity. Sovrin Foundation"},{"key":"953_CR46","volume-title":"Max Weber-Studienausgabe","author":"M Weber","year":"2014","unstructured":"Weber\u00a0M (2014) Wirtschaft und Gesellschaft. Soziologie. Unvollendet. 1919\u20131920. In: Borchardt\u00a0K, Hanke\u00a0E, Schluchter\u00a0W, Weber\u00a0M (Hrsg) Max Weber-Studienausgabe. Mohr Siebeck,"},{"key":"953_CR47","first-page":"2543","volume-title":"The social construction of self-sovereign identity: an extended model of interpretive flexibility","author":"L Weigl","year":"2022","unstructured":"Weigl\u00a0L, Barbereau\u00a0T, Rieger\u00a0A, Fridgen\u00a0G (2022) The social construction of self-sovereign identity: an extended model of interpretive flexibility. Hawaii International Conference on System Sciences. Bd. 55, S 2543\u20132552"},{"key":"953_CR48","doi-asserted-by":"publisher","DOI":"10.1524\/9783110376265","volume-title":"Einf\u00fchrung in die Volkswirtschaftslehre, Mikro\u00f6konomie und Wettbewerbspolitik: Module der Volkswirtschaftslehre","author":"L Wildmann","year":"2014","unstructured":"Wildmann\u00a0L (2014) Einf\u00fchrung in die Volkswirtschaftslehre, Mikro\u00f6konomie und Wettbewerbspolitik: Module der Volkswirtschaftslehre Bd. I. De Gruyter Oldenbourg https:\/\/doi.org\/10.1524\/9783110376265"},{"key":"953_CR49","unstructured":"World Wide Web Consortium (W3C) (2022) Verifiable Credentials Data Model v1.1. https:\/\/www.w3.org\/TR\/vc-data-model\/. Zugegriffen: 6. September 2022"},{"key":"953_CR50","volume-title":"On the Usability of Self Sovereign Identity Solutions (Nr.\u00a02)","author":"RN Zaeem","year":"2021","unstructured":"Zaeem\u00a0RN, Khalil\u00a0MM, Lamison\u00a0MR, Pandey\u00a0S, Barber\u00a0KS (2021) On the Usability of Self Sovereign Identity Solutions (Nr.\u00a02). University of Texas"}],"container-title":["HMD Praxis der Wirtschaftsinformatik"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-023-00953-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1365\/s40702-023-00953-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-023-00953-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,23]],"date-time":"2023-03-23T11:08:50Z","timestamp":1679569730000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1365\/s40702-023-00953-5"}},"subtitle":["Betrachtung am Beispiel des Projektes ID-Ideal, einem im Rahmen des Innovationswettbewerbs \u201eSchaufenster Sichere Digitale Identit\u00e4ten\u201c des Bundesministeriums f\u00fcr Wirtschaft und Klimaschutz (BMWK) gef\u00f6rderten Projektes","Examination using the example of the ID-Ideal project\u00a0funded by the Federal Ministry for Economic Affairs and Climate Action\u00a0as part of the \u201cShowcase Secure Digital Identities\u201d"],"short-title":[],"issued":{"date-parts":[[2023,3,20]]},"references-count":46,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["953"],"URL":"https:\/\/doi.org\/10.1365\/s40702-023-00953-5","relation":{},"ISSN":["1436-3011","2198-2775"],"issn-type":[{"type":"print","value":"1436-3011"},{"type":"electronic","value":"2198-2775"}],"subject":[],"published":{"date-parts":[[2023,3,20]]},"assertion":[{"value":"16 September 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 February 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 March 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}