{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T16:26:34Z","timestamp":1772727994992,"version":"3.50.1"},"reference-count":0,"publisher":"Bristol University Press","isbn-type":[{"value":"9781529238983","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026,3,31]]},"DOI":"10.56687\/9781529238983-001","type":"book-chapter","created":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:16:51Z","timestamp":1772723811000},"page":"iv-vi","source":"Crossref","is-referenced-by-count":0,"title":["Acknowledgements"],"prefix":"10.56687","author":[{"given":"Melissa","family":"Tyler","sequence":"first","affiliation":[]}],"member":"165","container-title":["Organizing Vulnerability"],"original-title":[],"link":[{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.56687\/9781529238983-001\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.56687\/9781529238983-001\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:21:59Z","timestamp":1772724119000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.56687\/9781529238983-001\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,31]]},"ISBN":["9781529238983"],"references-count":0,"alternative-id":["10.56687\/9781529238983-001","10.56687\/9781529238983"],"URL":"https:\/\/doi.org\/10.56687\/9781529238983-001","relation":{},"subject":[],"published":{"date-parts":[[2026,3,31]]}}}