{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T04:47:21Z","timestamp":1742964441565,"version":"3.40.3"},"publisher-location":"Cham","reference-count":55,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030031916"},{"type":"electronic","value":"9783030031923"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-03192-3_36","type":"book-chapter","created":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T03:06:48Z","timestamp":1540523208000},"page":"471-485","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Information Systems Success: Empirical Evidence on Cloud-based ERP"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5775-8494","authenticated-orcid":false,"given":"Thanh D.","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Khiem V. T.","family":"Luc","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,27]]},"reference":[{"key":"36_CR1","doi-asserted-by":"crossref","unstructured":"Ahmad, S., Bakar, A., Ahmad, N.: Social media adoption and its impact on firm performance: the case of the UAE. Int. J. Entrep. Behav. Res. (2018, in-press)","DOI":"10.1108\/IJEBR-08-2017-0299"},{"key":"36_CR2","doi-asserted-by":"crossref","unstructured":"Albar, A., Hoque, M.: Factors affecting cloud ERP adoption in Saudi Arabia: An empirical study. Inf. Dev. (2018, in-press)","DOI":"10.1177\/0266666917735677"},{"issue":"1","key":"36_CR3","doi-asserted-by":"publisher","first-page":"29","DOI":"10.5840\/bpej1997161\/2\/310","volume":"16","author":"K Alpern","year":"1997","unstructured":"Alpern, K.: What do we want trust to be? Some distinctions of trust. Bus. Prof. Ethics J. 16(1), 29\u201345 (1997)","journal-title":"Bus. Prof. Ethics J."},{"key":"36_CR4","doi-asserted-by":"crossref","unstructured":"Akter, S., Wamba, S., Ambra, J.: Enabling a transformative service system by modeling quality dynamics. Int. J. Prod. Econ. (2018, in-press)","DOI":"10.1016\/j.ijpe.2016.08.025"},{"key":"36_CR5","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-319-95450-9_2","volume-title":"Emerging Technologies in Computing","author":"A Al-Badi","year":"2018","unstructured":"Al-Badi, A., Tarhini, A., Al-Qirim, N.: Risks in adopting cloud computing: a proposed conceptual framework. In: Miraz, M.H., Excell, P., Ware, A., Soomro, S., Ali, M. (eds.) iCETiC 2018. LNICST, vol. 200, pp. 16\u201337. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-95450-9_2"},{"key":"36_CR6","unstructured":"Bauer, R.: Consumer behavior as risk taking. In: AMA Proceedings (1960)"},{"key":"36_CR7","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/s12599-009-0068-x","volume":"5","author":"A Benlian","year":"2009","unstructured":"Benlian, A., Hess, T., Buxmann, P.: Drivers of SaaS-adoption-an empirical study of different application types. Bus. Inform. Syst. Eng. 5, 357\u2013369 (2009)","journal-title":"Bus. Inform. Syst. Eng."},{"issue":"2","key":"36_CR8","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1142\/S0219622015500078","volume":"14","author":"F Cabanillas","year":"2015","unstructured":"Cabanillas, F., Leiva, F., Fernandez, J.: Payment systems in new electronic environments: consumer behavior in payment systems via SMS. Int. J. Inform. Technol. Decis. Mak. 14(2), 421\u2013449 (2015)","journal-title":"Int. J. Inform. Technol. Decis. Mak."},{"issue":"3","key":"36_CR9","doi-asserted-by":"publisher","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"F Davis","year":"1989","unstructured":"Davis, F.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q. 13(3), 319\u2013340 (1989)","journal-title":"MIS Q."},{"issue":"1","key":"36_CR10","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1287\/isre.3.1.60","volume":"3","author":"W DeLone","year":"1992","unstructured":"DeLone, W., McLean, E.: Information systems success: the quest for the dependent variable. Inform. Syst. Res. 3(1), 60\u201395 (1992)","journal-title":"Inform. Syst. Res."},{"issue":"4","key":"36_CR11","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1080\/07421222.2003.11045748","volume":"19","author":"W Delone","year":"2003","unstructured":"Delone, W., McLean, E.: The DeLone and McLean model of information systems success: a ten-year update. J. Manag. Inf. Syst. 19(4), 9\u201330 (2003)","journal-title":"J. Manag. Inf. Syst."},{"issue":"1","key":"36_CR12","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1080\/10864415.2004.11044317","volume":"9","author":"W Delone","year":"2004","unstructured":"Delone, W., McLean, E.: Measuring e-commerce success: Applying the DeLone & McLean information systems success model. Int. J. Electron. Commer. 9(1), 31\u201347 (2004)","journal-title":"Int. J. Electron. Commer."},{"issue":"1","key":"36_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/2900000005","volume":"2","author":"W Delone","year":"2016","unstructured":"Delone, W., Mclean, E.: Information systems success measurement. Found. Trends Inf. Syst. 2(1), 1\u2013116 (2016)","journal-title":"Found. Trends Inf. Syst."},{"issue":"1","key":"36_CR14","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1287\/isre.1060.0080","volume":"17","author":"T Dinev","year":"2006","unstructured":"Dinev, T., Hart, P.: An extended privacy calculus model for e-commerce transactions. Inf. Syst. Res. 17(1), 61\u201380 (2006)","journal-title":"Inf. Syst. Res."},{"issue":"2","key":"36_CR15","first-page":"1","volume":"1","author":"M Elmonem","year":"2016","unstructured":"Elmonem, M., Nasr, E., Geith, M.: Benefits and challenges of cloud ERP systems\u2014a systematic literature review. Future Comput. Inf. J. 1(2), 1\u20139 (2016)","journal-title":"Future Comput. Inf. J."},{"issue":"4","key":"36_CR16","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1016\/S1071-5819(03)00111-3","volume":"59","author":"M Featherman","year":"2003","unstructured":"Featherman, M., Pavlou, P.: Predicting e-services adoption: a perceived risk facets perspective. Int. J. Human-Comput. Stud. 59(4), 451\u2013474 (2003)","journal-title":"Int. J. Human-Comput. Stud."},{"issue":"7","key":"36_CR17","first-page":"377","volume":"9","author":"G Gable","year":"2008","unstructured":"Gable, G., Sedera, D., Chan, T.: Re-conceptualizing information system success: the IS-impact measurement model. J. AIS 9(7), 377\u2013408 (2008)","journal-title":"J. AIS"},{"issue":"1","key":"36_CR18","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1108\/JEIM-08-2013-0065","volume":"28","author":"H Gangwar","year":"2015","unstructured":"Gangwar, H., Date, H., Ramaswamy, R.: Understanding determinants of cloud computing adoption using an integrated TAM-TOE model. J. Enterp. Inf. Manag. 28(1), 107\u2013130 (2015)","journal-title":"J. Enterp. Inf. Manag."},{"issue":"1","key":"36_CR19","doi-asserted-by":"publisher","first-page":"51","DOI":"10.2307\/30036519","volume":"27","author":"D Gefen","year":"2003","unstructured":"Gefen, D., Karahanna, E., Straub, D.: Trust and TAM in online shopping: an integrated model. MIS Q. 27(1), 51\u201390 (2003)","journal-title":"MIS Q."},{"issue":"6","key":"36_CR20","first-page":"146","volume":"2","author":"M Goel","year":"2011","unstructured":"Goel, M., Kiran, D., Garg, D.: Impact of cloud computing on ERP implementations in higher education. Int. J. Adv. Comput. Sci. Appl. 2(6), 146\u2013148 (2011)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"issue":"2","key":"36_CR21","doi-asserted-by":"publisher","first-page":"213","DOI":"10.2307\/249689","volume":"19","author":"D Goodhue","year":"1995","unstructured":"Goodhue, D., Thompson, R.: Task-technology fit and individual performance. MIS Q. 19(2), 213\u2013236 (1995)","journal-title":"MIS Q."},{"issue":"2","key":"36_CR22","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1108\/IJLM-07-2017-0192","volume":"29","author":"S Gupta","year":"2018","unstructured":"Gupta, S., Kumar, S., Singh, S., Foropon, C., Chandra, C.: Role of cloud ERP on the performance of an organization: contingent resource based view perspective. Int. J. Logistics Manag. 29(2), 659\u2013675 (2018)","journal-title":"Int. J. Logistics Manag."},{"key":"36_CR23","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.is.2014.07.006","volume":"47","author":"I Hashem","year":"2015","unstructured":"Hashem, I., Yaqoob, I., Anuar, N., Mokhtar, S., Gani, A., Khan, S.: The rise of \u201cbig data\u201d on cloud computing: review and open research issues. Inf. Syst. 47, 98\u2013115 (2015)","journal-title":"Inf. Syst."},{"key":"36_CR24","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1002\/9781119256151.ch6","volume-title":"The Wiley Blackwell Handbook of the Psychology of the Internet at Work","author":"Sirkka L. Jarvenpaa","year":"2017","unstructured":"Jarvenpaa, S., Cantu, C., Lim, S.: Trust in virtual online environments. In: Handbook of the Psychology of the Internet at Work, pp. 103\u2013130. Wiley, New York (2017)"},{"key":"36_CR25","unstructured":"Johnson, D.: ERP cloud news (2017). http:\/\/erpcloudnews.com"},{"key":"36_CR26","unstructured":"Keen, P.: MIS research: reference disciplines and a cumulative tradition. In: ICIS Proceedings, p. 9 (1980)"},{"key":"36_CR27","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MITP.2010.128","volume":"5","author":"K Khan","year":"2010","unstructured":"Khan, K., Malluhi, Q.: Establishing trust in cloud computing. IT Prof. 5, 20\u201327 (2010)","journal-title":"IT Prof."},{"issue":"3","key":"36_CR28","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1287\/isre.1060.0093","volume":"17","author":"D Kim","year":"2006","unstructured":"Kim, D., Benbasat, I.: The effects of trust-assuring arguments on consumer trust in internet stores: application of Toulmin\u2019s model of argumentation. Inf. Syst. Res. 17(3), 286\u2013300 (2006)","journal-title":"Inf. Syst. Res."},{"issue":"2","key":"36_CR29","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1023\/A:1026543906354","volume":"2","author":"H Klaus","year":"2000","unstructured":"Klaus, H., Rosemann, M., Gable, G.: What is ERP? Inf. Syst. Front. 2(2), 141\u2013162 (2000)","journal-title":"Inf. Syst. Front."},{"issue":"1","key":"36_CR30","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1023\/B:ITEM.0000008081.55563.d4","volume":"5","author":"S Komiak","year":"2004","unstructured":"Komiak, S., Benbasat, I.: Understanding customer trust in agent-mediated electronic commerce, web-mediated electronic commerce, and traditional commerce. Inf. Technol. Manag. 5(1), 181\u2013207 (2004)","journal-title":"Inf. Technol. Manag."},{"key":"36_CR31","unstructured":"Lancon, F.: ERP in cloud computing and information security issues (2013). http:\/\/tuvanphanmem.vn"},{"key":"36_CR32","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-981-10-0557-2_6","volume-title":"Information Science and Applications (ICISA) 2016","author":"T-M Lim","year":"2016","unstructured":"Lim, T.-M., Lee, A.S.-H., Yap, M.-K.: User Acceptance of SaaS ERP Considering Perceived Risk, System Performance and Cost. In: Kim, K., Joukov, N. (eds.) Information Science and Applications (ICISA) 2016. LNEE, vol. 376, pp. 53\u201363. Springer, Singapore (2016). https:\/\/doi.org\/10.1007\/978-981-10-0557-2_6"},{"issue":"1","key":"36_CR33","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.dss.2010.12.006","volume":"51","author":"S Marston","year":"2011","unstructured":"Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., Ghalsasi, A.: Cloud computing\u2014the business perspective. Decis. Supp. Syst. 51(1), 176\u2013189 (2011)","journal-title":"Decis. Supp. Syst."},{"issue":"4","key":"36_CR34","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/0378-7206(78)90028-9","volume":"1","author":"R Mason","year":"1978","unstructured":"Mason, R.: Measuring information output: a communication systems approach. Inf. Manag. 1(4), 219\u2013234 (1978)","journal-title":"Inf. Manag."},{"key":"36_CR35","doi-asserted-by":"crossref","unstructured":"Mell, P., Grance, T.: The NIST definition of cloud computing. In: NIST Special Publication, pp. 800\u2013145. NIST (2011)","DOI":"10.6028\/NIST.SP.800-145"},{"key":"36_CR36","unstructured":"Mijac, M., Picek, R., Stapic, Z.: Cloud ERP system customization challenges. In: Information and Intelligent Systems, Varazdin, pp. 133\u2013140 (2013)"},{"issue":"6","key":"36_CR37","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1016\/j.compind.2007.12.001","volume":"59","author":"E Ngai","year":"2008","unstructured":"Ngai, E., Law, C., Wat, F.: Examining the critical success factors in the adoption of enterprise resource planning. Comput. Ind. 59(6), 548\u2013564 (2008)","journal-title":"Comput. Ind."},{"key":"36_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/978-3-319-26135-5_18","volume-title":"Future Data and Security Engineering","author":"TD Nguyen","year":"2015","unstructured":"Nguyen, T.D., Nguyen, T.M., Cao, T.H.: Information systems success: a literature review. In: Dang, T.K., Wagner, R., K\u00fcng, J., Thoai, N., Takizawa, M., Neuhold, E. (eds.) FDSE 2015. LNCS, vol. 9446, pp. 242\u2013256. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-26135-5_18"},{"key":"36_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/978-3-319-12778-1_18","volume-title":"Future Data and Security Engineering","author":"TD Nguyen","year":"2014","unstructured":"Nguyen, T.D., Nguyen, T.T.T., Misra, S.: Cloud-based ERP solution for modern education in Vietnam. In: Dang, T.K., Wagner, R., Neuhold, E., Takizawa, M., K\u00fcng, J., Thoai, N. (eds.) FDSE 2014. LNCS, vol. 8860, pp. 234\u2013247. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-12778-1_18"},{"key":"36_CR40","unstructured":"Panorama: 2017 report on ERP systems and enterprise software. Panorama Consulting (2018). https:\/\/www.panorama-consulting.com"},{"key":"36_CR41","first-page":"6","volume":"7","author":"J Park","year":"2004","unstructured":"Park, J., Lee, D., Ahn, J.: Risk-focused e-commerce adoption model: a cross-country study. J. Glob. Inf. Technol. Manag. 7, 6\u201330 (2004)","journal-title":"J. Glob. Inf. Technol. Manag."},{"issue":"3","key":"36_CR42","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1080\/10864415.2003.11044275","volume":"7","author":"PA Pavlou","year":"2003","unstructured":"Pavlou, P.A.: Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. Int. J. Electron. Commun. 7(3), 101\u2013134 (2003)","journal-title":"Int. J. Electron. Commun."},{"issue":"4","key":"36_CR43","doi-asserted-by":"publisher","first-page":"7","DOI":"10.2753\/MIS0742-1222290401","volume":"29","author":"S Petter","year":"2013","unstructured":"Petter, S., DeLone, W., McLean, E.: Information systems success: the quest for the independent variables. J. Manag. Inf. Syst. 29(4), 7\u201362 (2013)","journal-title":"J. Manag. Inf. Syst."},{"issue":"1","key":"36_CR44","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1287\/isre.13.1.50.96","volume":"13","author":"A Rai","year":"2002","unstructured":"Rai, A., Lang, S., Welker, R.: Assessing the validity of IS success models: an empirical test and theoretical analysis. Inf. Syst. Res. 13(1), 50\u201369 (2002)","journal-title":"Inf. Syst. Res."},{"key":"36_CR45","series-title":"LNISO","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37021-2_10","volume-title":"Innovation and Future of Enterprise Information Systems","author":"D Rich","year":"2013","unstructured":"Rich, D., Dibbern, J.: A team-oriented investigation of ERP post-implementation integration projects: how cross-functional collaboration influences ERP benefits. In: Piazolo, F., Felderer, M. (eds.) Innovation and Future of Enterprise Information Systems. LNISO, vol. 4. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-37021-2_10"},{"issue":"2","key":"36_CR46","first-page":"81","volume":"8","author":"S Rouhani","year":"2016","unstructured":"Rouhani, S., Mehri, M.: Does ERP have benefits on the business intelligence readiness? An empirical study. Int. J. Inf. Syst. Change Manag. 8(2), 81\u2013105 (2016)","journal-title":"Int. J. Inf. Syst. Change Manag."},{"key":"36_CR47","unstructured":"Schubert, P., Adisa, F.: Cloud computing for standard ERP systems: reference framework and research agenda. Fachbereich Informatik (2011)"},{"issue":"3","key":"36_CR48","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1287\/isre.8.3.240","volume":"8","author":"P Seddon","year":"1997","unstructured":"Seddon, P.: A respecification and extension of the DeLone and McLean model of IS success. Inf. Syst. Res. 8(3), 240\u2013253 (1997)","journal-title":"Inf. Syst. Res."},{"key":"36_CR49","unstructured":"Sedera, D., Gable, G.: A factor and structural equation analysis of the enterprise systems success measurement model. In: ICIS Proceedings, p. 36 (2004)"},{"key":"36_CR50","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"C Shannon","year":"1948","unstructured":"Shannon, C., Weaver, W.: A mathematical theory of communication. Bell Syst. Technol. J. 27, 379\u2013423 (1948)","journal-title":"Bell Syst. Technol. J."},{"issue":"3","key":"36_CR51","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1111\/j.1365-2575.2008.00316.x","volume":"20","author":"L Staehr","year":"2010","unstructured":"Staehr, L.: Understanding the role of managerial agency in achieving business benefits from ERP systems. Inf. Syst. J. 20(3), 213\u2013238 (2010)","journal-title":"Inf. Syst. J."},{"issue":"1","key":"36_CR52","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S Subashini","year":"2011","unstructured":"Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1\u201311 (2011)","journal-title":"J. Netw. Comput. Appl."},{"key":"36_CR53","unstructured":"Utzig, C., Holland, D., Horvath, M., Manohar, M.: ERP in the cloud is it ready? Are you? Booz & Co., pp. 1\u20139 (2013)"},{"key":"36_CR54","volume-title":"Cloud Computing: A Practical Approach","author":"A Velte","year":"2010","unstructured":"Velte, A., Velte, T., Elsenpeter, R.: Cloud Computing: A Practical Approach. McGraw-Hill, New York (2010)"},{"key":"36_CR55","doi-asserted-by":"publisher","first-page":"425","DOI":"10.2307\/30036540","volume":"27","author":"V Venkatesh","year":"2003","unstructured":"Venkatesh, V., Morris, M., Davis, F.: User acceptance of information technology: toward a unified view. MIS Q. 27, 425\u2013478 (2003)","journal-title":"MIS Q."}],"container-title":["Lecture Notes in Computer Science","Future Data and Security Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-03192-3_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T15:10:49Z","timestamp":1709824249000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-03192-3_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030031916","9783030031923"],"references-count":55,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-03192-3_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"27 October 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FDSE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Future Data and Security Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ho Chi Minh City","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fdse2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.cse.hcmut.edu.vn\/fdse2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}