{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:27:50Z","timestamp":1767338870218,"version":"3.40.3"},"publisher-location":"Cham","reference-count":53,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030223113"},{"type":"electronic","value":"9783030223120"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-22312-0_17","type":"book-chapter","created":{"date-parts":[[2019,6,16]],"date-time":"2019-06-16T23:02:48Z","timestamp":1560726168000},"page":"238-252","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Predicting Students\u2019 Security Behavior Using Information-Motivation-Behavioral Skills Model"],"prefix":"10.1007","author":[{"given":"Ali","family":"Farooq","sequence":"first","affiliation":[]},{"given":"Debora","family":"Jeske","sequence":"additional","affiliation":[]},{"given":"Jouni","family":"Isoaho","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,5]]},"reference":[{"key":"17_CR1","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1016\/j.is.2010.11.003","volume":"36","author":"W Kim","year":"2011","unstructured":"Kim, W., Jeong, O.-R., Kim, C., So, J.: The dark side of the Internet: attacks, costs and responses. Inf. Syst. 36, 675\u2013705 (2011)","journal-title":"Inf. Syst."},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Aurigemma, S., Panko, R.: A composite framework for behavioral compliance with information security policies. In: 45th Hawaii International Conference on System Sciences, pp. 3248\u20133257. IEEE (2012)","DOI":"10.1109\/HICSS.2012.49"},{"key":"17_CR3","doi-asserted-by":"publisher","first-page":"523","DOI":"10.2307\/25750690","volume":"34","author":"B Bulgurcu","year":"2010","unstructured":"Bulgurcu, B., Cavusoglu, H., Benbasat, I.: Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Q. 34, 523\u2013548 (2010)","journal-title":"MIS Q."},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Pahnila, S., Siponen, M., Mahmood, A.: Employees\u2019 behavior towards IS security policy compliance. In: 2007 40th Annual Hawaii International Conference on System Sciences (HICSS 2007), p. 156b. IEEE (2007)","DOI":"10.1109\/HICSS.2007.206"},{"key":"17_CR5","unstructured":"Abraham, S.: Information security behavior: factors and research directions. In: AMCIS 2011 (2011)"},{"key":"17_CR6","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1287\/isre.1070.0160","volume":"20","author":"J D\u2019Arcy","year":"2009","unstructured":"D\u2019Arcy, J., Hovav, A., Galletta, D.: User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach. Inf. Syst. Res. 20, 79\u201398 (2009)","journal-title":"Inf. Syst. Res."},{"key":"17_CR7","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/1098899.1098901","volume":"6","author":"B Kerievsky","year":"1976","unstructured":"Kerievsky, B.: Security and confidentiality in a university computer network. ACM SIGUCCS Newsl. 6, 9\u201311 (1976)","journal-title":"ACM SIGUCCS Newsl."},{"key":"17_CR8","first-page":"24","volume":"46","author":"BL Ingerman","year":"2011","unstructured":"Ingerman, B.L., Yang, C.: Top-ten IT issues, 2011. Educ. Rev. 46, 24 (2011)","journal-title":"Educ. Rev."},{"key":"17_CR9","doi-asserted-by":"publisher","first-page":"1650007","DOI":"10.1142\/S0219649216500076","volume":"15","author":"S Al-Janabi","year":"2016","unstructured":"Al-Janabi, S., Al-Shourbaji, I.: A study of cyber security awareness in educational environment in the Middle East. J. Inf. Knowl. Manag. 15, 1650007 (2016)","journal-title":"J. Inf. Knowl. Manag."},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Katz, F.H.: The effect of a university information security survey on instruction methods in information security. In: Proceedings of the 2nd Annual Conference on Information Security Curriculum Development - InfoSecCD 2005, p. 43. ACM Press, New York (2005)","DOI":"10.1145\/1107622.1107633"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Farooq, A., Kakakhel, S.R.U., Virtanen, S., Isoaho, J.: A taxonomy of perceived information security and privacy threats among IT security students. In: 10th International Conference for Internet Technology and Secured Transactions, ICITST 2015, pp. 280\u2013286. IEEE (2016)","DOI":"10.1109\/ICITST.2015.7412106"},{"key":"17_CR12","unstructured":"Savitz, E.: Humans: the weakest link in information security. https:\/\/www.forbes.com\/sites\/ciocentral\/2011\/11\/03\/humans-the-weakest-link-in-information-security\/#77a4bb46de87"},{"key":"17_CR13","doi-asserted-by":"publisher","first-page":"1049","DOI":"10.1108\/MRR-04-2013-0085","volume":"37","author":"B Lebek","year":"2014","unstructured":"Lebek, B., Uffen, J., Neumann, M., Hohler, B., Breitner, M.H.: Information security awareness and behavior: a theory-based literature review. Manag. Res. Rev. Inf. Manag. Comput. Secur. 37, 1049\u20131092 (2014)","journal-title":"Manag. Res. Rev. Inf. Manag. Comput. Secur."},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Howe, A.E., Ray, I., Roberts, M., Urbanska, M., Byrne, Z.: The psychology of security for the home computer user. In: 2012 IEEE Symposium on Security and Privacy, pp. 209\u2013223. IEEE (2012)","DOI":"10.1109\/SP.2012.23"},{"issue":"1","key":"17_CR15","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1080\/00223980.1975.9915803","volume":"91","author":"Ronald W. Rogers","year":"1975","unstructured":"Rogers, R.W.: A protection motivation theory of fear appeals and attitude change. J. Psychol. 91, 93\u2013114 (1975)","journal-title":"The Journal of Psychology"},{"issue":"5","key":"17_CR16","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/0022-1031(83)90023-9","volume":"19","author":"James E Maddux","year":"1983","unstructured":"Maddux, J.E., Rogers, R.W.: Protection motivation and self-efficacy: a revised theory of fear appeals and attitude change. J. Exp. Soc. Psychol. 19, 469\u2013479 (1983)","journal-title":"Journal of Experimental Social Psychology"},{"issue":"1","key":"17_CR17","doi-asserted-by":"publisher","first-page":"26","DOI":"10.4018\/IJISP.2015010102","volume":"9","author":"Teodor Sommestad","year":"2015","unstructured":"Sommestad, T., Karlz\u00e9n, H., Hallberg, J.: A meta-analysis of studies on protection motivation theory and information security behaviour. Int. J. Inf. Secur. Priv. 9 (2015)","journal-title":"International Journal of Information Security and Privacy"},{"key":"17_CR18","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","volume":"50","author":"I Ajzen","year":"1991","unstructured":"Ajzen, I.: The theory of planned behavior. Organ. Behav. Hum. Decis. Process. 50, 179\u2013211 (1991)","journal-title":"Organ. Behav. Hum. Decis. Process."},{"key":"17_CR19","unstructured":"Sommerstad, T., Karlzen, H., Hallberg, J.: The theory of planned behavior and information security policy compliance. J. Comput. Inf. Syst. 1\u201310 (2017)"},{"key":"17_CR20","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1037\/0033-2909.111.3.455","volume":"111","author":"JD Fisher","year":"1992","unstructured":"Fisher, J.D., Fisher, W.A.: Changing AIDS-risk behavior. Psychol. Bull. 111, 455\u2013474 (1992)","journal-title":"Psychol. Bull."},{"key":"17_CR21","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.jadohealth.2004.08.013","volume":"38","author":"AA Robertson","year":"2006","unstructured":"Robertson, A.A., Stein, J.A., Baird-Thomas, C.: Gender differences in the prediction of condom use among incarcerated juvenile offenders: testing the information-motivation-behavior skills (IMB) model. J. Adolesc. Health 38, 18\u201325 (2006)","journal-title":"J. Adolesc. Health"},{"key":"17_CR22","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1023\/A:1025411317851","volume":"3","author":"WA Fisher","year":"1999","unstructured":"Fisher, W.A., Williams, S.S., Fisher, J.D., Malloy, T.E.: Understanding AIDS risk behavior among sexually active urban adolescents: an empirical test of the information\u2013motivation\u2013behavioral skills model. AIDS Behav. 3, 13\u201323 (1999)","journal-title":"AIDS Behav."},{"key":"17_CR23","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1037\/0278-6133.25.4.462","volume":"25","author":"JD Fisher","year":"2006","unstructured":"Fisher, J.D., Fisher, W.A., Harman, J.J.: An information-motivation-behavioral skills model of adherence to antiretroviral therapy. Health Psychol. 25, 462\u2013473 (2006)","journal-title":"Health Psychol."},{"key":"17_CR24","doi-asserted-by":"publisher","first-page":"2648","DOI":"10.1111\/j.1559-1816.2008.00408.x","volume":"38","author":"DE Glasford","year":"2008","unstructured":"Glasford, D.E.: Predicting voting behavior of young adults: the importance of information, motivation, and behavioral skills. J. Appl. Soc. Psychol. 38, 2648\u20132672 (2008)","journal-title":"J. Appl. Soc. Psychol."},{"key":"17_CR25","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/j.jenvp.2010.02.002","volume":"30","author":"JD Seacat","year":"2010","unstructured":"Seacat, J.D., Northrup, D.: An information\u2013motivation\u2013behavioral skills assessment of curbside recycling behavior. J. Environ. Psychol. 30, 393\u2013401 (2010)","journal-title":"J. Environ. Psychol."},{"key":"17_CR26","doi-asserted-by":"crossref","unstructured":"Crossler, R.E., B\u00e9langer, F.: The mobile privacy-security knowledge gap model: understanding behaviors. In: 50th Hawaii International Conference on System Sciences (2017)","DOI":"10.24251\/HICSS.2017.491"},{"key":"17_CR27","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-23141-4_1","volume-title":"Information Security and Assurance","author":"B Khan","year":"2011","unstructured":"Khan, B., Alghathbar, K.S., Khan, M.K.: Information security awareness campaign: an alternate approach. In: Kim, T.-h., Adeli, H., Robles, R.J., Balitanas, M. (eds.) ISA 2011. CCIS, vol. 200, pp. 1\u201310. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23141-4_1"},{"key":"17_CR28","first-page":"51","volume":"21","author":"MG Mariani","year":"2014","unstructured":"Mariani, M.G., Zappal\u00e0, S.: PC virus attacks in small firms: effects of risk perceptions and information technology competence on preventive behaviors. TPM Test. Psychom. Methodol. Appl. Psychol. 21, 51\u201365 (2014)","journal-title":"TPM Test. Psychom. Methodol. Appl. Psychol."},{"key":"17_CR29","unstructured":"Pattinson, M.R., Anderson, G., Analyses, A.: End-user risk-taking behaviour: an application of the IMB model. In: 6th Annual Security Conference (2007)"},{"key":"17_CR30","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1037\/0278-6133.15.2.114","volume":"15","author":"JD Fisher","year":"1996","unstructured":"Fisher, J.D., Fisher, W.A., Misovich, S.J., Kimble, D.L., Malloy, T.E.: Changing AIDS risk behavior: effects of an intervention emphasizing AIDS risk reduction information, motivation, and behavioral skills in a college student population. Health Psychol. 15, 114\u2013123 (1996)","journal-title":"Health Psychol."},{"key":"17_CR31","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1080\/01449290701679361","volume":"29","author":"D-L Huang","year":"2010","unstructured":"Huang, D.-L., Rau, P.-L.P., Salvendy, G.: Perception of information security. Behav. Inf. Technol. 29, 221\u2013232 (2010)","journal-title":"Behav. Inf. Technol."},{"key":"17_CR32","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1016\/j.im.2007.05.003","volume":"44","author":"Q-J Yeh","year":"2007","unstructured":"Yeh, Q.-J., Chang, A.J.-T.: Threats and countermeasures for information system security: a cross-industry study. Inf. Manag. 44, 480\u2013491 (2007)","journal-title":"Inf. Manag."},{"key":"17_CR33","doi-asserted-by":"crossref","unstructured":"Farooq, A., Isoaho, J.J., Virtanen, S., Isoaho, J.J.: Information security awareness in educational institution: an analysis of students\u2019 individual factors. In: Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015, pp. 352\u2013359. IEEE (2015)","DOI":"10.1109\/Trustcom.2015.394"},{"key":"17_CR34","doi-asserted-by":"publisher","first-page":"1884","DOI":"10.1111\/jocn.14304","volume":"27","author":"T Chang","year":"2018","unstructured":"Chang, T., et al.: A study on the information-motivation-behavioral skills model among Chinese adults with peritoneal dialysis. J. Clin. Nurs. 27, 1884\u20131890 (2018)","journal-title":"J. Clin. Nurs."},{"key":"17_CR35","doi-asserted-by":"publisher","first-page":"145","DOI":"10.2307\/249749","volume":"23","author":"D Compeau","year":"1999","unstructured":"Compeau, D., Higgins, C.A., Huff, S.: Social cognitive theory and individual reactions to computing technology: a longitudinal study. MIS Q. 23, 145 (1999)","journal-title":"MIS Q."},{"key":"17_CR36","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1287\/isre.6.2.118","volume":"6","author":"DR Compeau","year":"1995","unstructured":"Compeau, D.R., Higgins, C.A.: Application of social cognitive theory to training for computer skills. Inf. Syst. Res. 6, 118\u2013143 (1995)","journal-title":"Inf. Syst. Res."},{"key":"17_CR37","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.cose.2017.01.010","volume":"66","author":"D Jeske","year":"2017","unstructured":"Jeske, D., van Schaik, P.: Familiarity with Internet threats: beyond awareness. Comput. Secur. 66, 129\u2013141 (2017)","journal-title":"Comput. Secur."},{"key":"17_CR38","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1108\/09685221011095236","volume":"18","author":"H Kruger","year":"2010","unstructured":"Kruger, H., Drevin, L., Steyn, T.: A vocabulary test to assess information security awareness. Inf. Manag. Comput. Secur. 18, 316\u2013327 (2010)","journal-title":"Inf. Manag. Comput. Secur."},{"key":"17_CR39","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1287\/isre.6.2.144","volume":"6","author":"S Taylor","year":"1995","unstructured":"Taylor, S., Todd, P.A.: Understanding information technology usage: a test of competing models. Inf. Syst. Res. 6, 144\u2013176 (1995)","journal-title":"Inf. Syst. Res."},{"key":"17_CR40","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1207\/s15327752jpa5201_2","volume":"52","author":"GD Zimet","year":"1988","unstructured":"Zimet, G.D., Dahlem, N.W., Zimet, S.G., Farley, G.K.: The multidimensional scale of perceived social support. J. Pers. Assess. 52, 30\u201341 (1988)","journal-title":"J. Pers. Assess."},{"key":"17_CR41","doi-asserted-by":"publisher","first-page":"1231","DOI":"10.1046\/j.1365-2648.1998.01231.x","volume":"27","author":"JE Hupcey","year":"1998","unstructured":"Hupcey, J.E.: Clarifying the social support theory-research linkage. J. Adv. Nurs. 27, 1231\u20131241 (1998)","journal-title":"J. Adv. Nurs."},{"key":"17_CR42","doi-asserted-by":"publisher","first-page":"613","DOI":"10.2307\/25750694","volume":"34","author":"CL Anderson","year":"2010","unstructured":"Anderson, C.L., Agarwal, R.: Practicing safe computing: a multimethod empirical examination of home computer user security behavioral intentions. MIS Q. 34, 613\u2013643 (2010)","journal-title":"MIS Q."},{"key":"17_CR43","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1016\/j.cose.2017.07.003","volume":"70","author":"N Thompson","year":"2017","unstructured":"Thompson, N., McGill, T.J., Wang, X.: \u201cSecurity begins at home\u201d: determinants of home computer and mobile device security behavior. Comput. Secur. 70, 376\u2013391 (2017)","journal-title":"Comput. Secur."},{"key":"17_CR44","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/MSP.2017.3681050","volume":"15","author":"R Reeder","year":"2017","unstructured":"Reeder, R., Ion, I., Consolvo, S.: 152 simple steps to stay safe online: security advice for non-tech-savvy users. IEEE Secur. Priv. 15, 55\u201364 (2017)","journal-title":"IEEE Secur. Priv."},{"key":"17_CR45","unstructured":"Ion, I., Reeder, R., Consolvo, S.: \u201c\u2026no one can hack my mind\u201d: comparing expert and non-expert security practices. In: 2015 Symposium on Usable Privacy and Security, pp. 327\u2013340 (2015)"},{"key":"17_CR46","doi-asserted-by":"crossref","unstructured":"Egelman, S., Peer, E.: Scaling the security wall: developing a security behavior intentions scale (SeBIS). In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems - CHI 2015, pp. 2873\u20132882. ACM Press, New York (2015)","DOI":"10.1145\/2702123.2702249"},{"key":"17_CR47","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.jfbs.2014.01.002","volume":"5","author":"CM Ringle","year":"2014","unstructured":"Ringle, C.M., Smith, D., Reams, R.: Partial least squares structural equation modeling (PLS-SEM): a useful tool for family business researchers. J. Fam. Bus. Strateg. 5, 105\u2013115 (2014)","journal-title":"J. Fam. Bus. Strateg."},{"key":"17_CR48","volume-title":"A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM)","author":"JF Hair Jr","year":"2016","unstructured":"Hair Jr., J.F., Hult, G.T., Ringle, C., Sarstedt, M.: A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM). Sage Publishers, Thousand Oaks (2016)"},{"key":"17_CR49","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1109\/TPC.2014.2312452","volume":"57","author":"PB Lowry","year":"2014","unstructured":"Lowry, P.B., Gaskin, J.: Partial least squares (PLS) structural equation modeling (SEM) for building and testing behavioral causal theory: when to choose it and how to use it. IEEE Trans. Prof. Commun. 57, 123\u2013146 (2014)","journal-title":"IEEE Trans. Prof. Commun."},{"key":"17_CR50","volume-title":"Multivariate Data Analysis","author":"JF Hair","year":"2010","unstructured":"Hair, J.F., Black, W.C., Babin, B.J., Anderson, R.E., Tatham, R.L.: Multivariate Data Analysis. Prentice Hall, Upper Saddle River (2010)"},{"key":"17_CR51","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/s11747-014-0403-8","volume":"43","author":"J Henseler","year":"2015","unstructured":"Henseler, J., Ringle, C.M., Sarstedt, M.: A new criterion for assessing discriminant validity in variance-based structural equation modeling. J. Acad. Mark. Sci. 43, 115\u2013135 (2015)","journal-title":"J. Acad. Mark. Sci."},{"key":"17_CR52","unstructured":"Chin, W.W.: The partial least squares approach to structural equation modeling. In: Marcoulides, G.A. (ed.) Modern Methods for Business Research, pp. 295\u2013336 (1998)"},{"key":"17_CR53","doi-asserted-by":"crossref","unstructured":"Mayer, P., Kunz, A., Volkamer, M.: Reliable behavioural factors in the information security context. In: Proceedings of the 12th International Conference on Availability, Reliability and Security, ARES 2017, pp. 1\u201310. ACM Press, New York (2017)","DOI":"10.1145\/3098954.3098986"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22312-0_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T15:36:01Z","timestamp":1710257761000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-22312-0_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030223113","9783030223120"],"references-count":53,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22312-0_17","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"5 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lisbon","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"34","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.ifipsec.org\/2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"76","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}