{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T14:23:29Z","timestamp":1771856609238,"version":"3.50.1"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030051709","type":"print"},{"value":"9783030051716","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05171-6_14","type":"book-chapter","created":{"date-parts":[[2018,12,5]],"date-time":"2018-12-05T10:52:06Z","timestamp":1544007126000},"page":"272-287","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["From Cyber Security Activities to Collaborative Virtual Environments Practices Through the 3D CyberCOP Platform"],"prefix":"10.1007","author":[{"given":"Alexandre","family":"Kabil","sequence":"first","affiliation":[]},{"given":"Thierry","family":"Duval","sequence":"additional","affiliation":[]},{"given":"Nora","family":"Cuppens","sequence":"additional","affiliation":[]},{"given":"G\u00e9rard","family":"Le Comte","sequence":"additional","affiliation":[]},{"given":"Yoran","family":"Halgand","sequence":"additional","affiliation":[]},{"given":"Christophe","family":"Ponchel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,5]]},"reference":[{"issue":"3","key":"14_CR1","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1111\/cgf.13430","volume":"37","author":"JA Wagner Filho","year":"2018","unstructured":"Wagner Filho, J.A., Freitas, C.M., Nedel, L.: VirtualDesk: a comfortable and efficient immersive information visualization approach. Comput. Graph. Forum 37(3), 415\u2013426 (2018). https:\/\/doi.org\/10.1111\/cgf.13430","journal-title":"Comput. Graph. Forum"},{"key":"14_CR2","doi-asserted-by":"publisher","unstructured":"Ahrend, J.M., Jirotka, M., Jones, K.: On the collaborative practices of cyber threat intelligence analysts to develop and utilize tacit threat and defence knowledge. In: 2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA), pp. 1\u201310, June 2016. https:\/\/doi.org\/10.1109\/CyberSA.2016.7503279","DOI":"10.1109\/CyberSA.2016.7503279"},{"issue":"2","key":"14_CR3","first-page":"660","volume":"6","author":"F Alotaibi","year":"2016","unstructured":"Alotaibi, F., Furnell, S., Stengel, I., Papadaki, M.: A review of using gaming technology for cyber-security awareness. Int. J. Inf. Secur. Res. (IJISR) 6(2), 660\u2013666 (2016)","journal-title":"Int. J. Inf. Secur. Res. (IJISR)"},{"key":"14_CR4","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.jss.2013.11.1078","volume":"89","author":"P Antunes","year":"2014","unstructured":"Antunes, P., Herskovic, V., Ochoa, S.F., Pino, J.A.: Reviewing the quality of awareness support in collaborative applications. J. Syst. Softw. 89, 146\u2013169 (2014). https:\/\/doi.org\/10.1016\/j.jss.2013.11.1078 . https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0164121213002756","journal-title":"J. Syst. Softw."},{"issue":"2","key":"14_CR5","doi-asserted-by":"publisher","first-page":"8:1","DOI":"10.1145\/2089125.2089128","volume":"44","author":"P Antunes","year":"2008","unstructured":"Antunes, P., Herskovic, V., Ochoa, S.F., Pino, J.A.: Structuring dimensions for collaborative systems evaluation. ACM Comput. Surv. 44(2), 8:1\u20138:28 (2008). https:\/\/doi.org\/10.1145\/2089125.2089128","journal-title":"ACM Comput. Surv."},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Chandler, T., et al.: Immersive analytics. In: Big Data Visual Analytics (BDVA), pp. 1\u20138. IEEE (2015)","DOI":"10.1109\/BDVA.2015.7314296"},{"issue":"1","key":"14_CR7","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF01409793","volume":"3","author":"EF Churchill","year":"1998","unstructured":"Churchill, E.F., Snowdon, D.: Collaborative virtual environments: an introductory review of issues and systems. Virtual Real. 3(1), 3\u201315 (1998). https:\/\/doi.org\/10.1007\/BF01409793","journal-title":"Virtual Real."},{"key":"14_CR8","unstructured":"Cliquet, G., Perreira, M., Picarougne, F., Pri\u00e9, Y., Vigier, T.: Towards HMD-based immersive analytics. In: Immersive Analytics Workshop, IEEE VIS 2017, Phoenix, United States, October 2017. https:\/\/hal.archives-ouvertes.fr\/hal-01631306"},{"key":"14_CR9","doi-asserted-by":"publisher","unstructured":"Donalek, C., et al.: Immersive and collaborative data visualization using virtual reality platforms. In: 2014 IEEE International Conference on Big Data (Big Data), pp. 609\u2013614, October 2014. https:\/\/doi.org\/10.1109\/BigData.2014.7004282","DOI":"10.1109\/BigData.2014.7004282"},{"key":"14_CR10","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/978-3-319-91635-4_9","volume-title":"Advanced Computing Strategies for Engineering","author":"C Eller","year":"2018","unstructured":"Eller, C., Bittner, T., Dombois, M., R\u00fcppel, U.: Collaborative immersive planning and training scenarios in VR. In: Smith, I.F.C., Domer, B. (eds.) Advanced Computing Strategies for Engineering, pp. 164\u2013185. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-91635-4_9"},{"key":"14_CR11","doi-asserted-by":"publisher","unstructured":"Evesti, A., Kanstrn, T., Frantti, T.: Cybersecurity situational awareness taxonomy. In: 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA), pp. 1\u20138, June 2017. https:\/\/doi.org\/10.1109\/CyberSA.2017.8073386","DOI":"10.1109\/CyberSA.2017.8073386"},{"key":"14_CR12","unstructured":"Gros, P., Abel, P., Dos Santos, R., Loisel, D., Trichaud, N., Paris, J.: Experimenting service-oriented 3D metaphors for managing networks using virtual reality. In: Laval Virtual-Virtual Reality International Conference, May 2000"},{"issue":"1","key":"14_CR13","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1109\/COMST.2015.2450538","volume":"18","author":"VT Guimaraes","year":"2016","unstructured":"Guimaraes, V.T., Freitas, C.M.D.S., Sadre, R., Tarouco, L.M.R., Granville, L.Z.: A survey on information visualization for network and service management. IEEE Commun. Surv. Tutor. 18(1), 285\u2013323 (2016)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"14_CR14","doi-asserted-by":"publisher","unstructured":"Hackathorn, R., Margolis, T.: Immersive analytics: building virtual data worlds for collaborative decision support. In: 2016 Workshop on Immersive Analytics (IA), pp. 44\u201347, March 2016.. https:\/\/doi.org\/10.1109\/IMMERSIVE.2016.7932382","DOI":"10.1109\/IMMERSIVE.2016.7932382"},{"key":"14_CR15","first-page":"73","volume":"16","author":"BP H\u00e1mornik","year":"2017","unstructured":"H\u00e1mornik, B.P., Krasznay, C.: Prerequisites of virtual teamwork in security operations centers: knowledge, skills, abilities and other characteristics. Acad. Appl. Res. Mil. Public Manag. Sci. 16, 73 (2017)","journal-title":"Acad. Appl. Res. Mil. Public Manag. Sci."},{"key":"14_CR16","doi-asserted-by":"publisher","unstructured":"Hui, P., et al.: Towards efficient collaboration in cyber security. In: 2010 International Symposium on Collaborative Technologies and Systems, pp. 489\u2013498, May 2010. https:\/\/doi.org\/10.1109\/CTS.2010.5478473","DOI":"10.1109\/CTS.2010.5478473"},{"key":"14_CR17","doi-asserted-by":"publisher","unstructured":"Inoue, D., Eto, M., Suzuki, K., Suzuki, M., Nakao, K.: DAEDALUS-VIZ: novel real-time 3D visualization for darknet monitoring-based alert system, VizSec 2012, pp. 72\u201379. ACM, New York (2012). https:\/\/doi.org\/10.1145\/2379690.2379700","DOI":"10.1145\/2379690.2379700"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Kabil, A., Thierry, D., Nora, C., Gerard, L., Yoran, H., Christophe, P.: Why should we use 3D collaborative virtual environments (3DCVE) for cyber security? In: 2018 IEEE Third VR International Workshop on Collaborative Virtual Environments (3DCVE), March 2018","DOI":"10.1109\/3DCVE.2018.8637109"},{"key":"14_CR19","doi-asserted-by":"publisher","unstructured":"Kanstrn, T., Evesti, A.: A study on the state of practice in security situational awareness. In: 2016 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), pp. 69\u201376, August 2016. https:\/\/doi.org\/10.1109\/QRS-C.2016.14","DOI":"10.1109\/QRS-C.2016.14"},{"key":"14_CR20","doi-asserted-by":"publisher","unstructured":"Latvala, O.M., et al.: Visualizing network events in a muggle friendly way. In: 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA), pp. 1\u20134, June 2017. https:\/\/doi.org\/10.1109\/CyberSA.2017.8073400","DOI":"10.1109\/CyberSA.2017.8073400"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Le Ch\u00e9n\u00e9chal, M., Chalm\u00e9, S., Duval, T., Royan, J., Gouranton, V., Arnaldi, B.: Toward an enhanced mutual awareness in asymmetric CVE. In: Proceedings of International Conference on Collaboration Technologies and Systems (CTS 2015) (2015)","DOI":"10.1109\/CTS.2015.7210428"},{"key":"14_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1007\/978-3-319-91152-6_38","volume-title":"Learning and Collaboration Technologies. Learning and Teaching","author":"S M\u00e4ses","year":"2018","unstructured":"M\u00e4ses, S., Randmann, L., Maennel, O., Lorenz, B.: Stenmap: framework for evaluating cybersecurity-related skills based on computer simulations. In: Zaphiris, P., Ioannou, A. (eds.) LCT 2018, Part II. LNCS, vol. 10925, pp. 492\u2013504. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-91152-6_38"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"McKenna, S., Staheli, D., Meyer, M.: Unlocking user-centered design methods for building cyber security visualizations. In: 2015 IEEE Symposium on Visualization for Cyber Security (VizSec), pp. 1\u20138. IEEE (2015)","DOI":"10.1109\/VIZSEC.2015.7312771"},{"key":"14_CR24","doi-asserted-by":"publisher","unstructured":"Michel, M.C.K., Helmick, N.P., Mayron, L.M.: Cognitive cyber situational awareness using virtual worlds. In: 2011 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), pp. 179\u2013182, February 2011. https:\/\/doi.org\/10.1109\/COGSIMA.2011.5753440","DOI":"10.1109\/COGSIMA.2011.5753440"},{"key":"14_CR25","first-page":"181","volume":"800","author":"W Newhouse","year":"2017","unstructured":"Newhouse, W., Keith, S., Scribner, B., Witte, G.: National initiative for cybersecurity education (NICE) cybersecurity workforce framework. NIST Spec. Publ. 800, 181 (2017)","journal-title":"NIST Spec. Publ."},{"issue":"1","key":"14_CR26","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1080\/02684527.2017.1316956","volume":"33","author":"KL Petersen","year":"2018","unstructured":"Petersen, K.L., Tjalve, V.S.: Intelligence expertise in the age of information sharing: publicprivate collection and its challenges to democratic control and accountability. Intell. Natl. Secur. 33(1), 21\u201335 (2018). https:\/\/doi.org\/10.1080\/02684527.2017.1316956","journal-title":"Intell. Natl. Secur."},{"key":"14_CR27","unstructured":"Pirker, J., G\u00fctl, C.: Virtual worlds for 3D visualizations. In: 11th International Conference on Intelligent Environments (Workshop), pp. 265\u2013272 (2015)"},{"key":"14_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-3-319-61152-5_8","volume-title":"Theory and Models for Cyber Situation Awareness","author":"P Rajivan","year":"2017","unstructured":"Rajivan, P., Cooke, N.: Impact of team collaboration on cybersecurity situational awareness. In: Liu, P., Jajodia, S., Wang, C. (eds.) Theory and Models for Cyber Situation Awareness. LNCS, vol. 10030, pp. 203\u2013226. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-61152-5_8"},{"key":"14_CR29","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.jisa.2017.05.006","volume":"34","author":"K Renaud","year":"2017","unstructured":"Renaud, K., Flowerday, S.: Contemplating human-centred security & privacy research: suggesting future directions. J. Inf. Secur. Appl. 34, 76\u201381 (2017). https:\/\/doi.org\/10.1016\/j.jisa.2017.05.006 . http:\/\/www.sciencedirect.com\/science\/article\/pii\/S2214212617302387 . Human-Centred Cyber Security","journal-title":"J. Inf. Secur. Appl."},{"issue":"1","key":"14_CR30","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.compedu.2015.03.009","volume":"86","author":"D Richards","year":"2015","unstructured":"Richards, D., Taylor, M.: A comparison of learning gains when using a 2D simulation tool versus a 3D virtual world. Comput. Educ. 86(1), 157\u2013171 (2015). https:\/\/doi.org\/10.1016\/j.compedu.2015.03.009","journal-title":"Comput. Educ."},{"key":"14_CR31","doi-asserted-by":"crossref","unstructured":"Robinson, M., Jones, K., Janicke, H., Maglaras, L.: Developing Cyber Peacekeeping: Observation. Monitoring and Reporting, ArXiv e-prints, June 2018","DOI":"10.1016\/j.giq.2018.12.001"},{"key":"14_CR32","doi-asserted-by":"publisher","unstructured":"Sethi, A., Wills, G.: Expert-interviews led analysis of EEVi - a model for effective visualization in cyber-security. In: 2017 IEEE Symposium on Visualization for Cyber Security (VizSec), pp. 1\u20138, October 2017. https:\/\/doi.org\/10.1109\/VIZSEC.2017.8062195","DOI":"10.1109\/VIZSEC.2017.8062195"},{"key":"14_CR33","doi-asserted-by":"publisher","unstructured":"Shen, C., Ho, J., Ly, P.T.M., Kuo, T.: Behavioural intentions of using virtual reality in learning: perspectives of acceptance of information technology and learning style. Virtual Real. (2018). https:\/\/doi.org\/10.1007\/s10055-018-0348-1","DOI":"10.1007\/s10055-018-0348-1"},{"issue":"8","key":"14_CR34","doi-asserted-by":"publisher","first-page":"1313","DOI":"10.1109\/TVCG.2011.144","volume":"18","author":"H Shiravi","year":"2012","unstructured":"Shiravi, H., Shiravi, A., Ghorbani, A.A.: A survey of visualization systems for network security. IEEE Trans. Vis. Comput. Graph. 18(8), 1313\u20131329 (2012)","journal-title":"IEEE Trans. Vis. Comput. Graph."},{"key":"14_CR35","doi-asserted-by":"publisher","unstructured":"Soares, A.G., et al.: A review of ways and strategies on how to collaborate in information visualization applications. In: 2016 20th International Conference Information Visualisation (IV), pp. 81\u201387, July 2016. https:\/\/doi.org\/10.1109\/IV.2016.69","DOI":"10.1109\/IV.2016.69"},{"key":"14_CR36","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.cose.2013.04.004","volume":"38","author":"R Solms von","year":"2013","unstructured":"von Solms, R., van Niekerk, J.: From information security to cyber security. Comput. Secur. 38, 97\u2013102 (2013). Cybercrime in the Digital Economy","journal-title":"Comput. Secur."},{"key":"14_CR37","doi-asserted-by":"publisher","unstructured":"Staheli, D., et al.: Visualization evaluation for cyber security: trends and future directions, VizSec 2014, pp. 49\u201356. ACM, New York (2014). https:\/\/doi.org\/10.1145\/2671491.2671492","DOI":"10.1145\/2671491.2671492"},{"key":"14_CR38","unstructured":"Sundaramurthy, S.C., McHugh, J., Ou, X., Wesch, M., Bardas, A.G., Rajagopalan, S.R.: Turning contradictions into innovations or: How we learned to stop whining and improve security operations. In: Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), Denver, CO, pp. 237\u2013251. USENIX Association (2016). https:\/\/www.usenix.org\/conference\/soups2016\/technical-sessions\/presentation\/sundaramurthy"},{"key":"14_CR39","unstructured":"Takahashi, T., Kadobayashi, Y., Nakao, K.: Toward global cybersecurity collaboration: cybersecurity operation activity model. In: Proceedings of ITU Kaleidoscope 2011: The Fully Networked Human? - Innovations for Future Networks and Services (K-2011), pp. 1\u20138, December 2011"},{"issue":"1","key":"14_CR40","doi-asserted-by":"crossref","first-page":"33","DOI":"10.20870\/IJVR.2016.16.1.2880","volume":"16","author":"K Tcha-Tokey","year":"2016","unstructured":"Tcha-Tokey, K., Christmann, O., Loup-Escande, E., Richir, S.: Proposition and validation of a questionnaire to measure the user experience in immersive virtual environments. Int. J. Virtual Real. 16(1), 33\u201348 (2016). https:\/\/hal.archives-ouvertes.fr\/hal-01404497","journal-title":"Int. J. Virtual Real."},{"key":"14_CR41","doi-asserted-by":"publisher","first-page":"910","DOI":"10.1049\/cje.2017.09.021","volume":"27","author":"Z Zhong","year":"2018","unstructured":"Zhong, Z., et al.: A user-centered multi-space collaborative visual analysis for cyber security. Chin. J. Electron. 27, 910\u2013919 (2018)","journal-title":"Chin. J. Electron."},{"key":"14_CR42","doi-asserted-by":"publisher","unstructured":"Zhu, H.: From WYSIWIS to WISINWIS: role-based collaboration. In: 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No. 04CH37583). vol. 6, pp. 5441\u20135446, October 2004. https:\/\/doi.org\/10.1109\/ICSMC.2004.1401059","DOI":"10.1109\/ICSMC.2004.1401059"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05171-6_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,16]],"date-time":"2020-11-16T16:57:05Z","timestamp":1605545825000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05171-6_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030051709","9783030051716"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05171-6_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangalore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iciss.org.in","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"51","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"45% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}