{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:17:37Z","timestamp":1761621457558,"version":"3.40.3"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030223113"},{"type":"electronic","value":"9783030223120"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-22312-0_14","type":"book-chapter","created":{"date-parts":[[2019,6,16]],"date-time":"2019-06-16T23:02:48Z","timestamp":1560726168000},"page":"194-208","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["The Influence of Organizational, Social and Personal Factors on Cybersecurity Awareness and Behavior of Home Computer Users"],"prefix":"10.1007","author":[{"given":"Jo\u00eblle","family":"Simonet","sequence":"first","affiliation":[]},{"given":"Stephanie","family":"Teufel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,5]]},"reference":[{"key":"14_CR1","series-title":"SSSP Springer Series in Social Psychology","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-3-642-69746-3_2","volume-title":"Action Control","author":"I Ajzen","year":"1985","unstructured":"Ajzen, I.: From intentions to actions: a theory of planned behavior. In: Kuhl, J., Beckmann, J. (eds.) Action Control. SSSSP, pp. 11\u201339. Springer, Heidelberg (1985). https:\/\/doi.org\/10.1007\/978-3-642-69746-3_2"},{"issue":"3","key":"14_CR2","doi-asserted-by":"publisher","first-page":"613","DOI":"10.2307\/25750694","volume":"34","author":"CL Anderson","year":"2010","unstructured":"Anderson, C.L., Agarwal, R.: Practicing safe computing: a multimedia empirical examination of home computer user security behavioral intentions. MIS Q. 34(3), 613\u2013643 (2010). https:\/\/doi.org\/10.2307\/25750694","journal-title":"MIS Q."},{"key":"14_CR3","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1016\/j.chb.2016.12.040","volume":"69","author":"M Anwar","year":"2017","unstructured":"Anwar, M., He, W., Ash, I., Yuan, X., Li, L., Xu, L.: Gender difference and employees\u2019 cybersecurity behaviors. Comput. Hum. Behav. 69, 437\u2013443 (2017). https:\/\/doi.org\/10.1016\/j.chb.2016.12.040","journal-title":"Comput. Hum. Behav."},{"key":"14_CR4","first-page":"15","volume-title":"The Science of Self-report","author":"W Baldwin","year":"1999","unstructured":"Baldwin, W.: Information no one else knows: the value of self-report. In: Stone, A., Bachrach, C., Jobe, J., Kurtzman, H., Cain, V. (eds.) The Science of Self-report, 1st edn, pp. 15\u201320. Psychology Press, Mahwah (1999)","edition":"1"},{"key":"14_CR5","volume-title":"Social Learning Theory","author":"A Bandura","year":"1971","unstructured":"Bandura, A.: Social Learning Theory. General Learning Press, New York, NY (1971)"},{"key":"14_CR6","unstructured":"Belanche Gracia, D., Casal\u00f3 Ari\u00f1o, L., Flavi\u00e1n Blanco, C.: Understanding the influence of social information sources on e-government adoption. Inf. Res. 17(3) (2012)"},{"key":"14_CR7","unstructured":"Blythe, J.: Cyber security in the workplace: Understanding and promoting behaviour change. In: Proceedings of CHItaly 2013 Doctoral Consortium, vol. 1065, pp. 92\u2013101 (2013)"},{"key":"14_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-33306-7","volume-title":"Forschungsmethoden und Evaluation f\u00fcr Human-und Sozialwissenschaftler","author":"J Bortz","year":"2006","unstructured":"Bortz, J., D\u00f6ring, N.: Forschungsmethoden und Evaluation f\u00fcr Human-und Sozialwissenschaftler, 4th edn. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/978-3-540-33306-7","edition":"4"},{"key":"14_CR9","doi-asserted-by":"publisher","unstructured":"Crossler, R.E.: Protection motivation theory: understanding determinants to backing up personal data. In: 2010 43rd Hawaii International Conference on System Sciences (HICSS), pp. 1\u201310. IEEE (2010). https:\/\/doi.org\/10.1109\/HICSS.2010.311","DOI":"10.1109\/HICSS.2010.311"},{"key":"14_CR10","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.cose.2012.09.010","volume":"32","author":"Robert E. Crossler","year":"2013","unstructured":"Crossler, R.E., Johnston, A.C., Lowry, P.B., Hu, Q., Warkentin, M., Baskerville, R.: Future directions for behavioral information security research. Comput. Secur. 32, 90\u2013101 (2013). https:\/\/doi.org\/10.1016\/j.cose.2012.09.010, http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404812001460","journal-title":"Computers & Security"},{"issue":"2","key":"14_CR11","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/j.cose.2009.09.002","volume":"29","author":"A Da Veiga","year":"2010","unstructured":"Da Veiga, A., Eloff, J.H.: A framework and assessment instrument for information security culture. Comput. Secur. 29(2), 196\u2013207 (2010). https:\/\/doi.org\/10.1016\/j.cose.2009.09.002","journal-title":"Comput. Secur."},{"issue":"1","key":"14_CR12","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1287\/isre.1070.0160","volume":"20","author":"J D\u2019Arcy","year":"2009","unstructured":"D\u2019Arcy, J., Hovav, A., Galletta, D.: User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach. Inf. Syst. Res. 20(1), 79\u201398 (2009). https:\/\/doi.org\/10.1287\/isre.1070.0160","journal-title":"Inf. Syst. Res."},{"issue":"2","key":"14_CR13","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1111\/j.2044-8325.1997.tb00639.x","volume":"70","author":"M Frese","year":"1997","unstructured":"Frese, M., Fay, D., Hilburger, T., Leng, K., Tag, A.: The concept of personal initiative: operationalization, reliability and validity in two German samples. J. Occup. Organ. Psychol. 70(2), 139\u2013161 (1997). https:\/\/doi.org\/10.1111\/j.2044-8325.1997.tb00639.x","journal-title":"J. Occup. Organ. Psychol."},{"issue":"5","key":"14_CR14","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1016\/j.cose.2007.03.001","volume":"26","author":"S Furnell","year":"2007","unstructured":"Furnell, S., Bryant, P., Phippen, A.: Assessing the security perceptions of personal internet users. Comput. Secur. 26(5), 410\u2013417 (2007). https:\/\/doi.org\/10.1016\/j.cose.2007.03.001","journal-title":"Comput. Secur."},{"issue":"3","key":"14_CR15","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1108\/IMDS-04-2016-0130","volume":"117","author":"J Hair","year":"2017","unstructured":"Hair, J., Hollingsworth, C.L., Randolph, A.B., Chong, A.Y.L.: An updated and expanded assessment of PLS-SEM in information systems research. Ind. Manag. Data Syst. 117(3), 442\u2013458 (2017). https:\/\/doi.org\/10.1108\/IMDS-04-2016-0130","journal-title":"Ind. Manag. Data Syst."},{"key":"14_CR16","volume-title":"A Primer on Partial Least Squares Structural Equation Modeling","author":"JF Hair","year":"2017","unstructured":"Hair, J.F., Hult, T., Ringle, C., Sarstedt, M.: A Primer on Partial Least Squares Structural Equation Modeling, 2nd edn. Sage, Thousand Oaks (2017)","edition":"2"},{"issue":"1","key":"14_CR17","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1080\/10580530.2015.1117842","volume":"33","author":"B Hanus","year":"2016","unstructured":"Hanus, B., Wu, Y.A.: Impact of users\u2019 security awareness on desktop security behavior: a protection motivation theory perspective. Inf. Syst. Manag. 33(1), 2\u201316 (2016). https:\/\/doi.org\/10.1080\/10580530.2015.1117842","journal-title":"Inf. Syst. Manag."},{"key":"14_CR18","unstructured":"H\u00e4ussinger, F.J., Kranz, J.J.: Information security awareness: its antecedents and mediating effects on security compliant behavior. In: International Conference on Information Systems (ICIS) (2013)"},{"issue":"1","key":"14_CR19","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/s11747-014-0403-8","volume":"43","author":"J Henseler","year":"2015","unstructured":"Henseler, J., Ringle, C.M., Sarstedt, M.: A new criterion for assessing discriminant validity in variance-based structural equation modeling. J. Acad. Mark. Sci. 43(1), 115\u2013135 (2015). https:\/\/doi.org\/10.1007\/s11747-014-0403-8","journal-title":"J. Acad. Mark. Sci."},{"key":"14_CR20","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1108\/S1474-7979(2009)0000020014","volume-title":"Advances in International Marketing","author":"J\u00f6rg Henseler","year":"2009","unstructured":"Henseler, J., Ringle, C.M., Sinkovics, R.R.: The use of partial least squares path modeling in international marketing. In: Sinkovics, R.R., Ghauri, P.N. (eds.) New Challenges to International Marketing, vol. 20, pp. 277\u2013319. Emerald Group Publishing Limited (2009). https:\/\/doi.org\/10.1108\/S1474-7979(2009)0000020014"},{"key":"14_CR21","doi-asserted-by":"publisher","unstructured":"Hertig, Y., Teufel, S.: Prosumer communities: electricity as an interpersonal construct. In: 2016 International Conference on Smart Grid and Clean Energy Technologies (ICSGCE), pp. 89\u201394. IEEE (2016). https:\/\/doi.org\/10.1109\/ICSGCE.2016.7876032","DOI":"10.1109\/ICSGCE.2016.7876032"},{"issue":"3","key":"14_CR22","doi-asserted-by":"publisher","first-page":"479","DOI":"10.4301\/s1807-17752016000300007","volume":"13","author":"R Hickmann Klein","year":"2016","unstructured":"Hickmann Klein, R., Mezzomo Luciano, E.: What influences information security behavior? A study with Brazilian users. JISTEM - J. Inf. Syst. Technol. Manag. 13(3), 479\u2013496 (2016). https:\/\/doi.org\/10.4301\/s1807-17752016000300007","journal-title":"JISTEM - J. Inf. Syst. Technol. Manag."},{"key":"14_CR23","doi-asserted-by":"publisher","unstructured":"Howe, A.E., Ray, I., Roberts, M., Urbanska, M., Byrne, Z.: The psychology of security for the home computer user. In: 2012 IEEE Symposium on Security and Privacy (SP), pp. 209\u2013223. IEEE (2012). https:\/\/doi.org\/10.1109\/SP.2012.23","DOI":"10.1109\/SP.2012.23"},{"key":"14_CR24","doi-asserted-by":"publisher","unstructured":"Kajtazi, M., Bulgurcu, B., Cavusoglu, H., Benbasat, I.: Assessing sunk cost effect on employees\u2019 intentions to violate information security policies in organizations. In: 2014 47th Hawaii International Conference on System Sciences (HICSS), pp. 3169\u20133177. IEEE (2014). https:\/\/doi.org\/10.1109\/HICSS.2014.393","DOI":"10.1109\/HICSS.2014.393"},{"key":"14_CR25","doi-asserted-by":"publisher","first-page":"663","DOI":"10.1016\/j.cose.2017.08.001","volume":"70","author":"D Ki-Aries","year":"2017","unstructured":"Ki-Aries, D., Faily, S.: Persona-centred information security awareness. Comput. Secur. 70, 663\u2013674 (2017). https:\/\/doi.org\/10.1016\/j.cose.2017.08.001","journal-title":"Comput. Secur."},{"key":"14_CR26","unstructured":"Leiner, D.J.: Sosci survey (version 3.1.01-i) [computer software] (2018). http:\/\/www.soscisurvey.com"},{"issue":"2","key":"14_CR27","first-page":"183","volume":"17","author":"J Muhirwe","year":"2016","unstructured":"Muhirwe, J., White, N.: Cybersecurity awareness and practice of next generation corporate technology users. Issues Inf. Syst. 17(2), 183\u2013192 (2016)","journal-title":"Issues Inf. Syst."},{"issue":"4","key":"14_CR28","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1016\/j.dss.2008.11.010","volume":"46","author":"BY Ng","year":"2009","unstructured":"Ng, B.Y., Kankanhalli, A., Xu, Y.C.: Studying users\u2019 computer security behavior: a health belief perspective. Decis. Support. Syst. 46(4), 815\u2013825 (2009). https:\/\/doi.org\/10.1016\/j.dss.2008.11.010","journal-title":"Decis. Support. Syst."},{"key":"14_CR29","unstructured":"Ng, B.Y., Rahim, M.: A socio-behavioral study of home computer users\u2019 intention to practice security. In: PACIS 2005 Proceedings, pp. 234\u2013247 (2005)"},{"key":"14_CR30","unstructured":"Organisation for Economic Co-operation and Development: OECD guidelines for the security of information systems and networks: Towards a culture of security (2002). http:\/\/www.oecd.org\/sti\/ieconomy\/15582260.pdf"},{"issue":"1","key":"14_CR31","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1093\/cybsec\/tyv008","volume":"1","author":"E Rader","year":"2015","unstructured":"Rader, E., Wash, R.: Identifying patterns in informal sources of security information. J. Cybersecur. 1(1), 121\u2013144 (2015). https:\/\/doi.org\/10.1093\/cybsec\/tyv008","journal-title":"J. Cybersecur."},{"key":"14_CR32","unstructured":"Ringle, C.M., Wende, S., Becker, J.M.: Smartpls 3 (version 3.2.5) [computer software] (2015). http:\/\/www.smartpls.com"},{"key":"14_CR33","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.cose.2014.03.004","volume":"43","author":"W Rocha Flores","year":"2014","unstructured":"Rocha Flores, W., Antonsen, E., Ekstedt, M.: Information security knowledge sharing in organizations: investigating the effect of behavioral information security governance and national culture. Comput. Secur. 43, 90\u2013110 (2014). https:\/\/doi.org\/10.1016\/j.cose.2014.03.004","journal-title":"Comput. Secur."},{"key":"14_CR34","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.cose.2016.01.004","volume":"59","author":"W Rocha Flores","year":"2016","unstructured":"Rocha Flores, W., Ekstedt, M.: Shaping intention to resist social engineering through transformational leadership, information security culture and awareness. Comput. Secur. 59, 26\u201344 (2016). https:\/\/doi.org\/10.1016\/j.cose.2016.01.004","journal-title":"Comput. Secur."},{"issue":"1","key":"14_CR35","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1080\/00223980.1975.9915803","volume":"91","author":"RW Rogers","year":"1975","unstructured":"Rogers, R.W.: A protection motivation theory of fear appeals and attitude change1. J. Psychol.: Interdiscip. Appl. 91(1), 93\u2013114 (1975). https:\/\/doi.org\/10.1080\/00223980.1975.9915803","journal-title":"J. Psychol.: Interdiscip. Appl."},{"key":"14_CR36","unstructured":"Rogers, R.W.: Cognitive and physiological processes in fear appeals and attitude change: a revised theory of protection motivation. In: Cacioppo, J.T., Petty, R. (eds.) Social Psychophysiology: A Sourcebook, chap. 6, pp. 153\u2013177. Guilford, New York (1983)"},{"key":"14_CR37","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-0-387-35586-3_15","volume-title":"Security in the Information Society","author":"T Schlienger","year":"2002","unstructured":"Schlienger, T., Teufel, S.: Information security culture. In: Ghonaimy, M.A., El-Hadidi, M.T., Aslan, H.K. (eds.) Security in the Information Society. IAICT, vol. 86, pp. 191\u2013201. Springer, Boston, MA (2002). https:\/\/doi.org\/10.1007\/978-0-387-35586-3_15"},{"key":"14_CR38","doi-asserted-by":"publisher","unstructured":"Sherif, E., Furnell, S., Clarke, N.: Awareness, behaviour and culture: the ABC in cultivating security compliance. In: The 10th International Conference for Internet Technology and Secured Transactions (ICITST-2015), pp. 90\u201394. IEEE (2015). https:\/\/doi.org\/10.1109\/ICITST.2015.7412064","DOI":"10.1109\/ICITST.2015.7412064"},{"key":"14_CR39","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2756736","author":"R Shillair","year":"2016","unstructured":"Shillair, R., Dutton, W.H.: Supporting a cybersecurity mindset: getting internet users into the cat and mouse game. SSRN Electron. J. (2016). https:\/\/doi.org\/10.2139\/ssrn.2756736","journal-title":"SSRN Electron. J."},{"key":"14_CR40","doi-asserted-by":"crossref","unstructured":"Simonet, J.: The Influence of Organizational, Social and Personal Factors on Cybersecurity Awareness and Behavior of Home Computer Users. Master\u2019s thesis, iimt, University of Fribourg (2018)","DOI":"10.1007\/978-3-030-22312-0_14"},{"key":"14_CR41","doi-asserted-by":"publisher","unstructured":"Talib, S., Clarke, N.L., Furnell, S.M.: An analysis of information security awareness within home and work environments. In: ARES 2010 International Conference on Availability, Reliability, and Security, pp. 196\u2013203. IEEE (2010). https:\/\/doi.org\/10.1109\/ARES.2010.27","DOI":"10.1109\/ARES.2010.27"},{"issue":"2","key":"14_CR42","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1287\/isre.6.2.144","volume":"6","author":"S Taylor","year":"1995","unstructured":"Taylor, S., Todd, P.A.: Understanding information technology usage: a test of competing models. Inf. Syst. Res. 6(2), 144\u2013176 (1995). https:\/\/doi.org\/10.1287\/isre.6.2.144","journal-title":"Inf. Syst. Res."},{"key":"14_CR43","doi-asserted-by":"publisher","unstructured":"Teufel, S., Teufel, B.: Crowd energy information security culture - security guidelines for smart environments. In: 2015 IEEE International Conference on Smart City\/SocialCom\/SustainCom (SmartCity), pp. 123\u2013128 (2015). https:\/\/doi.org\/10.1109\/SmartCity.2015.58","DOI":"10.1109\/SmartCity.2015.58"},{"issue":"4","key":"14_CR44","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1037\/\/0278-6133.12.4.324","volume":"12","author":"ND Weinstein","year":"1993","unstructured":"Weinstein, N.D.: Testing four competing theories of health-protective behavior. Health Psychol. 12(4), 324\u2013333 (1993). https:\/\/doi.org\/10.1037\/\/0278-6133.12.4.324","journal-title":"Health Psychol."},{"key":"14_CR45","unstructured":"Woon, I., Tan, G., Low, R.: A protection motivation theory approach to home wireless security. In: Proceedings of the Twenty-Sixth International Conference on Information Systems (ICIS), pp. 367\u2013380 (2005)"},{"issue":"2","key":"14_CR46","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1086\/651257","volume":"37","author":"X Zhao","year":"2010","unstructured":"Zhao, X., Lynch, J., Chen, Q.: Reconsidering Baron and Kenny: myths and truths about mediation analysis. J. Consum. Res. 37(2), 197\u2013206 (2010). https:\/\/doi.org\/10.1086\/651257","journal-title":"J. Consum. Res."}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22312-0_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T15:35:47Z","timestamp":1710257747000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-22312-0_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030223113","9783030223120"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22312-0_14","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"5 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lisbon","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"34","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.ifipsec.org\/2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"76","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}