{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T14:14:32Z","timestamp":1758636872510},"publisher-location":"Cham","reference-count":48,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030278120"},{"type":"electronic","value":"9783030278137"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-27813-7_8","type":"book-chapter","created":{"date-parts":[[2019,8,18]],"date-time":"2019-08-18T19:02:41Z","timestamp":1566154961000},"page":"110-125","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["The Interrelation of Game Elements and Privacy Requirements for the Design of a System: A Metamodel"],"prefix":"10.1007","author":[{"given":"Aikaterini-Georgia","family":"Mavroeidi","sequence":"first","affiliation":[]},{"given":"Angeliki","family":"Kitsiou","sequence":"additional","affiliation":[]},{"given":"Christos","family":"Kalloniatis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,2]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Deterding, S., Dixon, D., Khaled, R., Nacke, L.: From game design elements to gamefulness: defining \u2018gamification\u2019 (2011)","DOI":"10.1145\/2181037.2181040"},{"key":"8_CR2","doi-asserted-by":"publisher","first-page":"67","DOI":"10.3390\/fi11030067","volume":"11","author":"A-G Mavroeidi","year":"2019","unstructured":"Mavroeidi, A.-G., Kitsiou, A., Kalloniatis, C., Gritzalis, S.: Gamification vs. privacy: identifying and analysing the major concerns. Future Internet 11, 67 (2019). \n                      https:\/\/doi.org\/10.3390\/fi11030067","journal-title":"Future Internet"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Stanculescu, L.C., Bozzon, A., Sips, R.-J., Houben, G.: Work and play: an experiment in enterprise gamification. In: Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work and Social Computing - CSCW 2016, pp. 345\u2013357. ACM Press, San Francisco (2016)","DOI":"10.1145\/2818048.2820061"},{"key":"8_CR4","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s10055-009-0153-y","volume":"15","author":"A Seth","year":"2011","unstructured":"Seth, A., Vance, J.M., Oliver, J.H.: Virtual reality for assembly methods prototyping: a review. Virtual Real. 15, 5\u201320 (2011). \n                      https:\/\/doi.org\/10.1007\/s10055-009-0153-y","journal-title":"Virtual Real."},{"issue":"4","key":"8_CR5","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1162\/pres.1997.6.4.355","volume":"6","author":"R Azuma","year":"1997","unstructured":"Azuma, R.: A survey of augmented reality. Presence: Teleoperators Virtual Environ. 6(4), 355\u2013385 (1997)","journal-title":"Presence: Teleoperators Virtual Environ."},{"key":"8_CR6","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1080\/0968776042000216183","volume":"12","author":"G Conole","year":"2004","unstructured":"Conole, G., Dyke, M.: What are the affordances of information and communication technologies? ALT-J. 12, 113\u2013124 (2004). \n                      https:\/\/doi.org\/10.1080\/0968776042000216183","journal-title":"ALT-J."},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Mora, A., Riera, D., Gonzalez, C., Arnedo-Moreno, J.: A literature review of gamification design frameworks. In: 2015 7th International Conference on Games and Virtual Worlds for Serious Applications (VS-Games), pp. 1\u20138. IEEE, Sk\u00f6vde (2015)","DOI":"10.1109\/VS-GAMES.2015.7295760"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Hamari, J., Koivisto, J., Sarsa, H.: Does gamification work? \u2013 a literature review of empirical studies on gamification. In: 2014 47th Hawaii International Conference on System Sciences, pp. 3025\u20133034. IEEE, Waikoloa (2014)","DOI":"10.1109\/HICSS.2014.377"},{"key":"8_CR9","unstructured":"G\u00e5sland, M.M.: Master: Game mechanic based e-learning- a case study. Norwegian University of Science and Technology, Norway, June 2011"},{"key":"8_CR10","unstructured":"Huang, W.H.-Y., Soman, D.: A practitioner\u2019s guide to gamification of education. University of Toronto, December 2013"},{"key":"8_CR11","unstructured":"The 10 Best Educational Apps that use Gamification for adults in 2018. \n                      https:\/\/yukaichou.com\/gamification-examples\/top-10-education-gamification-examples\/"},{"key":"8_CR12","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1016\/j.sbspro.2014.07.034","volume":"148","author":"G Lucassen","year":"2014","unstructured":"Lucassen, G., Jansen, S.: Gamification in consumer marketing - future or fallacy? Procedia - Soc. Behav. Sci. 148, 194\u2013202 (2014). \n                      https:\/\/doi.org\/10.1016\/j.sbspro.2014.07.034","journal-title":"Procedia - Soc. Behav. Sci."},{"key":"8_CR13","doi-asserted-by":"publisher","first-page":"e70","DOI":"10.2196\/jmir.2058","volume":"14","author":"JA Cafazzo","year":"2012","unstructured":"Cafazzo, J.A., Casselman, M., Hamming, N., Katzman, D.K., Palmert, M.R.: Design of an mHealth app for the self-management of adolescent type 1 diabetes: a pilot study. J. Med. Internet Res. 14, e70 (2012). \n                      https:\/\/doi.org\/10.2196\/jmir.2058","journal-title":"J. Med. Internet Res."},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Huotari, K., Hamari, J.: Defining gamification: a service marketing perspective. In: Proceeding of the 16th International Academic MindTrek Conference on - MindTrek 2012, p. 17. ACM Press, Tampere (2012)","DOI":"10.1145\/2393132.2393137"},{"key":"8_CR15","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1007\/978-3-319-03973-2_38","volume-title":"Information and Communication Technologies in Tourism 2014","author":"F Xu","year":"2013","unstructured":"Xu, F., Weber, J., Buhalis, D.: Gamification in tourism. In: Xiang, Z., Tussyadiah, I. (eds.) Information and Communication Technologies in Tourism 2014, pp. 525\u2013537. Springer International Publishing, Cham (2013). \n                      https:\/\/doi.org\/10.1007\/978-3-319-03973-2_38"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Mehrbod, A., Mehrbod, N., Grilo, A., Vasconcelos, C., Silva, J.L.: Gamification in supported geocaching tours. In: 2017 International Conference on Engineering, Technology and Innovation (ICE\/ITMC), pp. 1419\u20131423. IEEE, Funchal (2017)","DOI":"10.1109\/ICE.2017.8280049"},{"key":"8_CR17","doi-asserted-by":"publisher","first-page":"188","DOI":"10.6007\/ijarbss\/v5-i10\/1867","volume":"5","author":"NS Sever","year":"2015","unstructured":"Sever, N.S., Sever, G.N., Kuhzady, S.: The evaluation of potentials of gamification in tourism marketing communication. Int. J. Acad. Res. Bus. Soc. Sci. 5, 188\u2013202 (2015). \n                      https:\/\/doi.org\/10.6007\/ijarbss\/v5-i10\/1867","journal-title":"Int. J. Acad. Res. Bus. Soc. Sci."},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Almaliki, M., Jiang, N., Ali, R., Dalpiaz, F.: Gamified culture-aware feedback acquisition. In: 2014 IEEE\/ACM 7th International Conference on Utility and Cloud Computing, pp. 624\u2013625. IEEE, London (2014)","DOI":"10.1109\/UCC.2014.99"},{"key":"8_CR19","unstructured":"D\u00f6pker, A., Brockmann, T., Stieglitz, S.: Use cases for gamification in virtual museums (2013)"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Heryadi, Y., Robbany, A.Z., Sudarma, H.: User experience evaluation of virtual reality-based cultural gamification using GameFlow approach. In: 2016 1st International Conference on Game, Game Art, and Gamification (ICGGAG), pp. 1\u20135. IEEE, Jakarta (2016)","DOI":"10.1109\/ICGGAG.2016.8052644"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Yonemura, K., Yajima, K., Komura, R., Sato, J., Takeichi, Y.: Practical security education on operational technology using gamification method. In: 2017 7th IEEE International Conference on Control System, Computing and Engineering (ICCSCE), pp. 284\u2013288. IEEE (2017)","DOI":"10.1109\/ICCSCE.2017.8284420"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Yonemura, K., et al.: Effect of security education using KIPS and gamification theory at KOSEN. In: 2018 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE), pp. 255\u2013258. IEEE, Penang (2018)","DOI":"10.1109\/ISCAIE.2018.8405480"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Yonemura, K., Sato, J., Takeichi, Y., Komura, R., Yajima, K.: Security education using gamification theory. In: 2018 International Conference on Engineering, Applied Sciences, and Technology (ICEAST), pp. 1\u20134. IEEE, Phuket (2018)","DOI":"10.1109\/ICEAST.2018.8434432"},{"key":"8_CR24","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-662-45501-2_17","volume-title":"The Practice of Enterprise Modeling","author":"A Shahri","year":"2014","unstructured":"Shahri, A., Hosseini, M., Phalp, K., Taylor, J., Ali, R.: Towards a code of ethics for gamification at enterprise. In: Frank, U., Loucopoulos, P., Pastor, \u00d3., Petrounias, I. (eds.) PoEM 2014. LNBIP, vol. 197, pp. 235\u2013245. Springer, Heidelberg (2014). \n                      https:\/\/doi.org\/10.1007\/978-3-662-45501-2_17"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Herzig, P., Ameling, M., Schill, A.: A generic platform for enterprise gamification. In: 2012 Joint Working IEEE\/IFIP Conference on Software Architecture and European Conference on Software Architecture, pp. 219\u2013223. IEEE, Helsinki (2012)","DOI":"10.1109\/WICSA-ECSA.212.33"},{"key":"8_CR26","doi-asserted-by":"crossref","unstructured":"Pattakou, A., Mavroeidi, A.-G., Diamantopoulou, V., Kalloniatis, C., Gritzalis, S.: Towards the design of usable privacy by design methodologies. In: 2018 IEEE 5th International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE), pp. 1\u20138. IEEE, Banff (2018)","DOI":"10.1109\/ESPRE.2018.00007"},{"key":"8_CR27","unstructured":"Pattakou, A., Kalloniatis, C., Gritzalis, S.: Security and privacy requirements engineering methods for traditional and cloud-based systems: a review. In: CLOUD Computing (2017)"},{"key":"8_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jsse.2012070101","volume":"3","author":"S Islam","year":"2012","unstructured":"Islam, S., Mouratidis, H., Kalloniatis, C., Hudic, A., Zechner, L.: Model based process to support security and privacy requirements engineering. Int. J. Secure Softw. Eng. 3, 1\u201322 (2012). \n                      https:\/\/doi.org\/10.4018\/jsse.2012070101","journal-title":"Int. J. Secure Softw. Eng."},{"key":"8_CR29","unstructured":"Liu, L., Yu, E., Mylopoulos, J.: Security and privacy requirements analysis within a social setting. J. Light. Technol. 151\u2013161 (2003)"},{"key":"8_CR30","doi-asserted-by":"publisher","first-page":"4341","DOI":"10.1016\/j.asoc.2010.10.012","volume":"11","author":"C Kalloniatis","year":"2011","unstructured":"Kalloniatis, C., Belsis, P., Gritzalis, S.: A soft computing approach for privacy requirements engineering: the PriS framework. Appl. Soft Comput. 11, 4341\u20134348 (2011). \n                      https:\/\/doi.org\/10.1016\/j.asoc.2010.10.012","journal-title":"Appl. Soft Comput."},{"key":"8_CR31","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s00766-010-0115-7","volume":"16","author":"M Deng","year":"2011","unstructured":"Deng, M., Wuyts, K., Scandariato, R., Preneel, B., Joosen, W.: A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requir. Eng. 16, 3\u201332 (2011). \n                      https:\/\/doi.org\/10.1007\/s00766-010-0115-7","journal-title":"Requir. Eng."},{"key":"8_CR32","unstructured":"Jensen, C., Tullio, J., Potts, C., Mynatt, E.D.: STRAP: a structured analysis framework for privacy (2015)"},{"key":"8_CR33","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1177\/0141076813480996","volume":"106","author":"D King","year":"2013","unstructured":"King, D., Greaves, F., Exeter, C., Darzi, A.: \u2018Gamification\u2019: influencing health behaviours with games. J. R. Soc. Med. 106, 76\u201378 (2013). \n                      https:\/\/doi.org\/10.1177\/0141076813480996","journal-title":"J. R. Soc. Med."},{"key":"8_CR34","unstructured":"Top Ten Gamified Healthcare Games that will extend your Life. \n                      https:\/\/yukaichou.com\/gamification-examples\/top-ten-gamification-healthcare-games\/"},{"key":"8_CR35","unstructured":"de Paz, B.M.: Gamification: a tool to improve sustainability efforts. Ph.D. dissertation, University of Manchester, England (2013)"},{"key":"8_CR36","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.ijhcs.2014.09.006","volume":"74","author":"K Seaborn","year":"2015","unstructured":"Seaborn, K., Fels, D.I.: Gamification in theory and action: a survey. Int. J. Hum.-Comput. Stud. 74, 14\u201331 (2015). \n                      https:\/\/doi.org\/10.1016\/j.ijhcs.2014.09.006","journal-title":"Int. J. Hum.-Comput. Stud."},{"key":"8_CR37","unstructured":"Top 10 Marketing Gamification Cases You Won\u2019t Forget. \n                      https:\/\/yukaichou.com\/gamification-examples\/top-10-marketing-gamification-cases-remember\/"},{"key":"8_CR38","volume-title":"For the Win: How Game Thinking Can Revolutionize Your Business","author":"K Werbach","year":"2012","unstructured":"Werbach, K., Hunter, D.: For the Win: How Game Thinking Can Revolutionize Your Business. Wharton Digital Press, Philadelphia (2012)"},{"key":"8_CR39","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/s40614-014-0006-1","volume":"37","author":"ZH Morford","year":"2014","unstructured":"Morford, Z.H., Witts, B.N., Killingsworth, K.J., Alavosius, M.P.: Gamification: the intersection between behavior analysis and game design technologies. Behav. Anal. 37, 25\u201340 (2014). \n                      https:\/\/doi.org\/10.1007\/s40614-014-0006-1","journal-title":"Behav. Anal."},{"key":"8_CR40","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.infsof.2017.10.015","volume":"95","author":"B Morschheuser","year":"2018","unstructured":"Morschheuser, B., Hassan, L., Werder, K., Hamari, J.: How to design gamification? A method for engineering gamified software. Inf. Softw. Technol. 95, 219\u2013237 (2018). \n                      https:\/\/doi.org\/10.1016\/j.infsof.2017.10.015","journal-title":"Inf. Softw. Technol."},{"key":"8_CR41","doi-asserted-by":"publisher","first-page":"e11","DOI":"10.2196\/mhealth.2596","volume":"1","author":"A Ahtinen","year":"2013","unstructured":"Ahtinen, A., et al.: Mobile mental wellness training for stress management: feasibility and design implications based on a one-month field study. JMIR Mhealth Uhealth 1, e11 (2013). \n                      https:\/\/doi.org\/10.2196\/mhealth.2596","journal-title":"JMIR Mhealth Uhealth"},{"key":"8_CR42","doi-asserted-by":"crossref","unstructured":"Bista, S.K., Nepal, S., Paris, C.: Engagement and cooperation in social networks: do benefits and rewards help? In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1405\u20131410. IEEE, Liverpool (2012)","DOI":"10.1109\/TrustCom.2012.145"},{"key":"8_CR43","doi-asserted-by":"crossref","unstructured":"Chen, Y., Pu, P.: HealthyTogether: exploring social incentives for mobile fitness applications. In: Proceedings of the Second International Symposium of Chinese CHI on - Chinese CHI 2014, pp. 25\u201334. ACM Press, Toronto (2014)","DOI":"10.1145\/2592235.2592240"},{"key":"8_CR44","unstructured":"Cheong, C., Cheong, F., Filippou, J.: Quick Quiz: a gamified approach for enhancing learning (2013)"},{"key":"8_CR45","doi-asserted-by":"crossref","unstructured":"Cramer, H., Rost, M., Holmquist, L.E.: Performing a check-in: emerging practices, norms and \u2018conflicts\u2019 in location-sharing using foursquare. In: Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services - MobileHCI 2011, p. 57. ACM Press, Stockholm (2011)","DOI":"10.1145\/2037373.2037384"},{"key":"8_CR46","doi-asserted-by":"crossref","unstructured":"McDaniel, R., Lindgren, R., Friskics, J.: Using badges for shaping interactions in online learning environments. In: 2012 IEEE International Professional Communication Conference, pp. 1\u20134. IEEE, Orlando (2012)","DOI":"10.1109\/IPCC.2012.6408619"},{"key":"8_CR47","doi-asserted-by":"crossref","unstructured":"Denny, P.: The effect of virtual achievements on student engagement. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems - CHI 2013, p. 763. ACM Press, Paris (2013)","DOI":"10.1145\/2470654.2470763"},{"key":"8_CR48","doi-asserted-by":"crossref","unstructured":"Amo, L.C., Liao, R., Rao, H.R., Walker, G.: Effects of leaderboards in games on consumer engagement. In: Proceedings of the 2018 ACM SIGMIS Conference on Computers and People Research - SIGMIS-CPR 2018, pp. 58\u201359. ACM Press, Buffalo-Niagara Falls (2018)","DOI":"10.1145\/3209626.3209708"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-27813-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,18]],"date-time":"2019-08-18T19:15:06Z","timestamp":1566155706000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-27813-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030278120","9783030278137"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-27813-7_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"2 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"TrustBus","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Trust and Privacy in Digital Business","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Linz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"trustbus2019a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.dexa.org\/trustbus2019","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mixed (single-blind and double-blind)","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"ConfDriver","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2-3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}