{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T15:02:17Z","timestamp":1772809337489,"version":"3.50.1"},"publisher-location":"Cham","reference-count":58,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030150341","type":"print"},{"value":"9783030150358","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-15035-8_87","type":"book-chapter","created":{"date-parts":[[2019,3,14]],"date-time":"2019-03-14T12:30:46Z","timestamp":1552566646000},"page":"887-896","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Social Credibility Incorporating Semantic Analysis and Machine Learning: A Survey of the State-of-the-Art and Future Research Directions"],"prefix":"10.1007","author":[{"given":"Bilal","family":"Abu-Salih","sequence":"first","affiliation":[]},{"given":"Bushra","family":"Bremie","sequence":"additional","affiliation":[]},{"given":"Pornpit","family":"Wongthongtham","sequence":"additional","affiliation":[]},{"given":"Kevin","family":"Duan","sequence":"additional","affiliation":[]},{"given":"Tomayess","family":"Issa","sequence":"additional","affiliation":[]},{"given":"Kit Yan","family":"Chan","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Alhabashneh","sequence":"additional","affiliation":[]},{"given":"Teshreen","family":"Albtoush","sequence":"additional","affiliation":[]},{"given":"Sulaiman","family":"Alqahtani","sequence":"additional","affiliation":[]},{"given":"Abdullah","family":"Alqahtani","sequence":"additional","affiliation":[]},{"given":"Muteeb","family":"Alahmari","sequence":"additional","affiliation":[]},{"given":"Naser","family":"Alshareef","sequence":"additional","affiliation":[]},{"given":"Abdulaziz","family":"Albahlal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,15]]},"reference":[{"issue":"5","key":"87_CR1","doi-asserted-by":"publisher","first-page":"949","DOI":"10.1108\/JKM-11-2016-0489","volume":"22","author":"B Abu-Salih","year":"2018","unstructured":"Abu-Salih, B., Wongthongtham, P., Kit, C.Y.: Twitter mining for ontology-based domain discovery incorporating machine learning. J. Knowl. Manag. 22(5), 949\u2013981 (2018)","journal-title":"J. Knowl. Manag."},{"key":"87_CR2","doi-asserted-by":"crossref","unstructured":"Nabipourshiri, R., Abu-Salih, B., Wongthongtham, P.: Tree-based classification to users\u2019 trustworthiness in OSNs In: Proceedings of the 2018 10th International Conference on Computer and Automation Engineering, pp. 190\u2013194. ACM, Brisbane, Australia (2018)","DOI":"10.1145\/3192975.3193004"},{"key":"87_CR3","doi-asserted-by":"crossref","unstructured":"Wongthongtham, P., Abu Salih, B.: Ontology and trust based data warehouse in new generation of business intelligence: state-of-the-art, challenges, and opportunities. In: 2015 IEEE 13th International Conference on Industrial Informatics (INDIN). IEEE (2015)","DOI":"10.1109\/INDIN.2015.7281780"},{"key":"87_CR4","unstructured":"Abu-Salih, B., et al.: Towards a methodology for social business intelligence in the era of big social data incorporating trust and semantic analysis. In: Second International Conference on Advanced Data and Information Engineering (DaEng-2015). Springer, Bali, Indonesia (2015)"},{"key":"87_CR5","unstructured":"Abu-Salih, B., et al.: CredSaT: credibility ranking of users in big social data incorporating semantic analysis and temporal factor. J. Inform. Sci. 0(0), 0165551518790424 (2018)"},{"key":"87_CR6","unstructured":"Abu-Salih, B.: Trustworthiness in Social Big Data Incorporating Semantic Analysis, Machine Learning and Distributed Data Processing. Curtin University (2018)"},{"key":"87_CR7","doi-asserted-by":"crossref","unstructured":"Chan, K.Y., et al.: Affective design using machine learning: a survey and its prospect of conjoining big data. Int. J. Comput. Integr. Manuf. 1\u201319 (2018)","DOI":"10.1080\/0951192X.2018.1526412"},{"issue":"4","key":"87_CR8","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1145\/2501654.2501661","volume":"45","author":"W Sherchan","year":"2013","unstructured":"Sherchan, W., Nepal, S., Paris, C.: A survey of trust in social networks. ACM Comput. Surv. 45(4), 47 (2013)","journal-title":"ACM Comput. Surv."},{"key":"87_CR9","unstructured":"Passant, A., et al.: Enabling trust and privacy on the social web. In: W3C Workshop on the Future of Social Networking (2009)"},{"key":"87_CR10","unstructured":"Podobnik, V., et al.: How to calculate trust between social network users? In: 2012 20th International Conference on Software, Telecommunications and Computer Networks (SoftCOM). IEEE (2012)"},{"key":"#cr-split#-87_CR11.1","doi-asserted-by":"crossref","unstructured":"Agarwal, M., Bin, Z.: Detecting malicious activities using backward propagation of trustworthiness over heterogeneous social graph. In: 2013 IEEE\/WIC\/ACM International Joint Conferences on Web Intelligence","DOI":"10.1109\/WI-IAT.2013.202"},{"key":"#cr-split#-87_CR11.2","unstructured":"(WI) and Intelligent Agent Technologies (IAT) (2013)"},{"key":"87_CR12","doi-asserted-by":"crossref","unstructured":"Massa, P., Bhattacharjee, B.: Using trust in recommender systems: an experimental analysis, in trust management. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) pp. 221\u2013235. Springer, Berlin, Heidelberg. (2004)","DOI":"10.1007\/978-3-540-24747-0_17"},{"key":"87_CR13","unstructured":"Gupta, P., et al.: WTF: the who to follow service at Twitter. In: Proceedings of the 22nd International Conference on World Wide Web, pp. 505\u2013514. International World Wide Web Conferences Steering Committee, Rio de Janeiro, Brazil (2003)"},{"key":"87_CR14","doi-asserted-by":"crossref","unstructured":"Gallege, L.S., et al.: Towards trust-based recommender systems for online software services. In: Proceedings of the 9th Annual Cyber and Information Security Research Conference, pp. 61\u201364. ACM, Oak Ridge, Tennessee (2014)","DOI":"10.1145\/2602087.2602118"},{"key":"87_CR15","doi-asserted-by":"crossref","first-page":"652","DOI":"10.1007\/978-3-319-11116-2_63","volume-title":"Web Technologies and Applications","author":"G Sun","year":"2014","unstructured":"Sun, G., et al.: A social trust path recommendation system in contextual online social networks. In: Chen, L., et al. (eds.) Web Technologies and Applications, pp. 652\u2013656. Springer, Cham (2014)"},{"issue":"22","key":"87_CR16","doi-asserted-by":"publisher","first-page":"8840","DOI":"10.1016\/j.eswa.2015.07.036","volume":"42","author":"DH Alahmadi","year":"2015","unstructured":"Alahmadi, D.H., Zeng, X.J.: ISTS: implicit social trust and sentiment based approach to recommender systems. Expert Syst. Appl. 42(22), 8840\u20138849 (2015)","journal-title":"Expert Syst. Appl."},{"key":"87_CR17","doi-asserted-by":"crossref","unstructured":"AlRubaian, M., et al.: A multistage credibility analysis model for microblogs. In: Proceedings of the 2015 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining 2015. ACM (2015)","DOI":"10.1145\/2808797.2810065"},{"issue":"4\u20136","key":"87_CR18","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1504\/IJSTM.2015.073917","volume":"21","author":"B Zhang","year":"2015","unstructured":"Zhang, B., et al.: A trust-based sentiment delivering calculation method in microblog. Int. J. Serv. Technol. Manag. 21(4\u20136), 185\u2013198 (2015)","journal-title":"Int. J. Serv. Technol. Manag."},{"issue":"12","key":"87_CR19","doi-asserted-by":"publisher","first-page":"2521","DOI":"10.1002\/asi.22768","volume":"63","author":"Y Bae","year":"2012","unstructured":"Bae, Y., Lee, H.: Sentiment analysis of twitter audiences: measuring the positive or negative influence of popular Twitterers. J. Am. Soc. Inform. Sci. Technol. 63(12), 2521\u20132535 (2012)","journal-title":"J. Am. Soc. Inform. Sci. Technol."},{"key":"87_CR20","doi-asserted-by":"crossref","unstructured":"Kawabe, T., et al.: Tweet credibility analysis evaluation by improving sentiment dictionary. In: 2015 IEEE Congress on Evolutionary Computation (CEC). IEEE (2015)","DOI":"10.1109\/CEC.2015.7257176"},{"issue":"3","key":"87_CR21","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/2811282","volume":"48","author":"E Momeni","year":"2016","unstructured":"Momeni, E., Cardie, C., Diakopoulos, N.: A survey on assessment and ranking methodologies for user-generated content on the web. ACM Comput. Surv. (CSUR) 48(3), 41 (2016)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"1","key":"87_CR22","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1504\/IJWBC.2016.074274","volume":"12","author":"A Amalanathan","year":"2016","unstructured":"Amalanathan, A., Anouncia, S.M.: A review on user influence ranking factors in social networks. Int. J. Web Based Commun. 12(1), 74\u201383 (2016)","journal-title":"Int. J. Web Based Commun."},{"key":"87_CR23","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.knosys.2016.05.042","volume":"106","author":"Y Ruan","year":"2016","unstructured":"Ruan, Y., Durresi, A.: A survey of trust management systems for online social communities\u2013trust modeling, trust inference and attacks. Knowl.-Based Syst. 106, 150\u2013163 (2016)","journal-title":"Knowl.-Based Syst."},{"issue":"6832","key":"87_CR24","doi-asserted-by":"publisher","first-page":"1023","DOI":"10.1038\/35074206","volume":"410","author":"T Berners-Lee","year":"2001","unstructured":"Berners-Lee, T., Hendler, J.: Publishing on the semantic web. Nature 410(6832), 1023 (2001)","journal-title":"Nature"},{"issue":"5","key":"87_CR25","doi-asserted-by":"publisher","first-page":"907","DOI":"10.1006\/ijhc.1995.1081","volume":"43","author":"TR Gruber","year":"1995","unstructured":"Gruber, T.R.: Toward principles for the design of ontologies used for knowledge sharing? Int. J. Hum Comput Stud. 43(5), 907\u2013928 (1995)","journal-title":"Int. J. Hum Comput Stud."},{"key":"87_CR26","unstructured":"De Nart, D., et al.: A content-based approach to social network analysis: a case study on research communities, in digital libraries on the move. In: Calvanese, D., De Nart, D., Tasso, C. (eds.) 11th Italian Research Conference on Digital Libraries, IRCDL 2015, Bolzano, Italy, 29\u201330 January 2015, pp. 142\u2013154. Springer, Cham, 2016, Revised Selected Papers"},{"key":"87_CR27","doi-asserted-by":"crossref","unstructured":"Chianese, A., Marulli, F., Piccialli, F.: Cultural heritage and social pulse: a semantic approach for CH sensitivity discovery in social media data. In: 2016 IEEE Tenth International Conference on Semantic Computing (ICSC) (2016)","DOI":"10.1109\/ICSC.2016.50"},{"key":"87_CR28","doi-asserted-by":"crossref","unstructured":"Michelson, M., Macskassy, S.A.: Discovering users; topics of interest on twitter: a first look. In: Proceedings of the Fourth Workshop on Analytics for Noisy Unstructured Text Data. ACM (2010)","DOI":"10.1145\/1871840.1871852"},{"key":"87_CR29","doi-asserted-by":"crossref","unstructured":"Schonhofen, P.: Identifying document topics using the wikipedia category network. In: Proceedings of the 2006 IEEE\/WIC\/ACM International Conference on Web Intelligence, pp. 456\u2013462. IEEE Computer Society (2006)","DOI":"10.1109\/WI.2006.92"},{"key":"87_CR30","doi-asserted-by":"crossref","unstructured":"Hassan, M.M., Karray, F., Kamel, M.S.: Automatic document topic identification using wikipedia hierarchical ontology. In: 2012 11th International Conference on Information Science, Signal Processing and their Applications (ISSPA) (2012)","DOI":"10.1109\/ISSPA.2012.6310552"},{"issue":"12","key":"87_CR31","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1145\/1859204.1859210","volume":"53","author":"G Anthes","year":"2010","unstructured":"Anthes, G.: Topic models Vs unstructured data. Commun. ACM 53(12), 16\u201318 (2010)","journal-title":"Commun. ACM"},{"key":"87_CR32","unstructured":"Wang, C., et al. Markov topic models. In: Artificial Intelligence and Statistics (2009)"},{"issue":"4\u20135","key":"87_CR33","first-page":"993","volume":"3","author":"DM Blei","year":"2003","unstructured":"Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent Dirichlet allocation. J. Mach. Learn. Res. 3(4\u20135), 993\u20131022 (2003)","journal-title":"J. Mach. Learn. Res."},{"issue":"Jan","key":"87_CR34","first-page":"993","volume":"3","author":"DM Blei","year":"2003","unstructured":"Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent Dirichlet allocation. J. Mach. Learn. Res. 3(Jan), 993\u20131022 (2003)","journal-title":"J. Mach. Learn. Res."},{"key":"87_CR35","doi-asserted-by":"crossref","unstructured":"Karami, A., et al.: Fuzzy approach topic discovery in health and medical corpora. Int. J. Fuzzy Syst. 1\u201312 (2017)","DOI":"10.1007\/s40815-017-0327-9"},{"key":"87_CR36","doi-asserted-by":"crossref","unstructured":"Hofmann, T.: Probabilistic latent semantic indexing. In: Proceedings of the 22nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. ACM (1999)","DOI":"10.1145\/312624.312649"},{"key":"87_CR37","doi-asserted-by":"crossref","unstructured":"Chen, Y., et al.: Topic modeling for evaluating students; reflective writing: a case study of pre-service teachers\u2019 journals. In: Proceedings of the Sixth International Conference on Learning Analytics & Knowledge. ACM (2016)","DOI":"10.1145\/2883851.2883951"},{"issue":"3","key":"87_CR38","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1007\/s11192-014-1319-2","volume":"100","author":"LG Nichols","year":"2014","unstructured":"Nichols, L.G.: A topic model approach to measuring interdisciplinarity at the national science foundation. Scientometrics 100(3), 741\u2013754 (2014)","journal-title":"Scientometrics"},{"key":"87_CR39","doi-asserted-by":"crossref","unstructured":"Weng, J., et al.: Twitterrank: finding topic-sensitive influential Twitterers. In: Proceedings of the Third ACM International Conference on Web Search and Data Mining. ACM (2010)","DOI":"10.1145\/1718487.1718520"},{"key":"87_CR40","unstructured":"Asharaf, S., Alessandro, Z.: Generating and visualizing topic hierarchies from microblogs: an iterative Latent Dirichlet allocation approach. In: 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE (2015)"},{"key":"87_CR41","doi-asserted-by":"crossref","unstructured":"Quercia, D., Askham, H., Crowcroft, J.: TweetLDA: supervised topic classification and link prediction in Twitter. In: The 4th Annual ACM Web Science Conference, pp. 247\u2013250. ACM, Evanston, Illinois (2012)","DOI":"10.1145\/2380718.2380750"},{"issue":"1","key":"87_CR42","first-page":"101","volume":"7","author":"A Onan","year":"2016","unstructured":"Onan, A., Korukoglu, S., Bulut, H.: LDA-based topic modelling in text sentiment classification: an empirical analysis. Int. J. Comput. Linguistics Appl. 7(1), 101\u2013119 (2016)","journal-title":"Int. J. Comput. Linguistics Appl."},{"key":"87_CR43","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1609\/icwsm.v4i1.14033","volume":"10","author":"M Cha","year":"2010","unstructured":"Cha, M., et al.: Measuring user influence in Twitter: the million follower fallacy. ICWSM 10, 10\u201317 (2010)","journal-title":"ICWSM"},{"key":"87_CR44","doi-asserted-by":"crossref","unstructured":"Silva, A., et al.: ProfileRank: finding relevant content and influential users based on information diffusion. In: Proceedings of the 7th Workshop on Social Network Mining and Analysis. ACM (2013)","DOI":"10.1145\/2501025.2501033"},{"key":"87_CR45","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.future.2012.06.010","volume":"31","author":"W Jiang","year":"2014","unstructured":"Jiang, W., Wang, G., Wu, J.: Generating trusted graphs for trust evaluation in online social networks. Future Gener. Comput. Syst. 31, 48\u201358 (2014)","journal-title":"Future Gener. Comput. Syst."},{"key":"87_CR46","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/978-1-4614-3223-4_13","volume-title":"Mining Text Data","author":"B Liu","year":"2012","unstructured":"Liu, B., Zhang, L.: A survey of opinion mining and sentiment analysis. In: Aggarwal, C., Zhai, C. (eds.) Mining Text Data, pp. 415\u2013463. Springer, Cham (2012)"},{"issue":"2\u20133","key":"87_CR47","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1561\/1500000024","volume":"6","author":"K Balog","year":"2012","unstructured":"Balog, K., et al.: Expertise retrieval. Found. Trends Inf. Retr. 6(2\u20133), 127\u2013256 (2012)","journal-title":"Found. Trends Inf. Retr."},{"issue":"3","key":"87_CR48","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/2699670","volume":"33","author":"HZ Yin","year":"2015","unstructured":"Yin, H.Z., et al.: Dynamic user modeling in social media systems. ACM Trans. Inf. Syst. 33(3), 10 (2015)","journal-title":"ACM Trans. Inf. Syst."},{"key":"87_CR49","doi-asserted-by":"crossref","unstructured":"Abbasi, M.-A., Liu, H.: Measuring user credibility in social media, in social computing, behavioral-cultural modeling and prediction. In: Greenberg, A., Kennedy, W., Bos, N. (eds.) pp. 441\u2013448. Springer, Berlin, Heidelberg (2013)","DOI":"10.1007\/978-3-642-37210-0_48"},{"key":"87_CR50","doi-asserted-by":"crossref","unstructured":"Yardi, S., et al.: Detecting spam in a Twitter network (2009)","DOI":"10.5210\/fm.v15i1.2793"},{"key":"87_CR51","unstructured":"Manyika, J., et al.: Big data: the next frontier for innovation, competition, and productivity. McKinsey Global Institute (2011)"},{"key":"87_CR52","doi-asserted-by":"crossref","unstructured":"Chen, M., et al.: Open issues and outlook. In: Big Data, pp. 81\u201389. Springer International Publishing (2014)","DOI":"10.1007\/978-3-319-06245-7_7"},{"key":"87_CR53","unstructured":"Lavbi\u010d, D., et al.: Traversal and relations discovery among business entities and people using semantic web technologies and trust management. In: Databases and Information Systems VII: Selected Papers from the Tenth International Baltic Conference, DB & IS 2012. IOS Press (2013)"},{"key":"87_CR54","doi-asserted-by":"crossref","unstructured":"Herzig, J., Mass, Y., Roitman, H.: An author-reader influence model for detecting topic-based influencers in social media. In: Proceedings of the 25th ACM Conference on Hypertext and Social Media. ACM (2014)","DOI":"10.1145\/2631775.2631804"},{"issue":"2","key":"87_CR55","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1109\/TKDE.2014.2327028","volume":"27","author":"W Shen","year":"2015","unstructured":"Shen, W., Wang, J., Han, J.: Entity linking with a knowledge base: Issues, techniques and solutions. IEEE Trans. Knowl. Data Eng. 27(2), 443\u2013460 (2015)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"87_CR56","unstructured":"Free Social Media Analytics Tools (2016). http:\/\/simplymeasured.com\/free-social-media-tools\/"},{"key":"87_CR57","doi-asserted-by":"crossref","unstructured":"Li, C., et al.: Topic Modeling for short texts with auxiliary word embeddings. In: Proceedings of the 39th International ACM SIGIR Conference on Research and Development in Information Retrieval. ACM (2016)","DOI":"10.1145\/2911451.2911499"}],"container-title":["Advances in Intelligent Systems and Computing","Web, Artificial Intelligence and Network Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-15035-8_87","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T14:03:40Z","timestamp":1694700220000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-15035-8_87"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030150341","9783030150358"],"references-count":58,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-15035-8_87","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"15 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WAINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Workshops of the International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Matsue","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 March 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 March 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"33","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"waina2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2019\/workshops.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}