{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T21:04:10Z","timestamp":1760043850129,"version":"3.40.3"},"publisher-location":"Cham","reference-count":54,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030293895"},{"type":"electronic","value":"9783030293901"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-29390-1_1","type":"book-chapter","created":{"date-parts":[[2019,8,28]],"date-time":"2019-08-28T11:03:21Z","timestamp":1566990201000},"page":"3-24","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["An Analysis of (Non-)Use Practices and Decisions of Internet of Things"],"prefix":"10.1007","author":[{"given":"Radhika","family":"Garg","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,23]]},"reference":[{"issue":"2","key":"1_CR1","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1207\/S15327051HCI1523_5","volume":"15","author":"MS Ackerman","year":"2000","unstructured":"Ackerman, M.S.: The intellectual challenge of CSCW: the gap between social requirements and technical feasibility. Hum.-Comput. Interact. 15(2), 179\u2013203 (2000)","journal-title":"Hum.-Comput. Interact."},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Ames, M.G.: Managing mobile multitasking: the culture of iPhones on Stanford campus. In: Proceedings of the 2013 Conference on Computer Supported Cooperative Work, pp. 1487\u20131498. ACM (2013)","DOI":"10.1145\/2441776.2441945"},{"issue":"15","key":"1_CR3","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787\u20132805 (2010)","journal-title":"Comput. Netw."},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Baumer, E.P., et al.: Limiting, leaving, and (re) lapsing: an exploration of Facebook non-use practices and experiences. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 3257\u20133266. ACM (2013)","DOI":"10.1145\/2470654.2466446"},{"issue":"2","key":"1_CR5","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1145\/2723667","volume":"22","author":"EP Baumer","year":"2015","unstructured":"Baumer, E.P., Burrell, J., Ames, M.G., Brubaker, J.R., Dourish, P.: On the importance and implications of studying technology non-use. Interactions 22(2), 52\u201356 (2015)","journal-title":"Interactions"},{"issue":"2","key":"1_CR6","doi-asserted-by":"publisher","first-page":"205630511561485","DOI":"10.1177\/2056305115614851","volume":"1","author":"Eric P. S. Baumer","year":"2015","unstructured":"Baumer, E.P., Guha, S., Quan, E., Mimno, D., Gay, G.K.: Missing photos, suffering withdrawal, or finding freedom? How experiences of social media non-use influence the likelihood of reversion. Soc. Media+ Soc. 1(2) (2015). https:\/\/doi.org\/10.1177\/2056305115614851","journal-title":"Social Media + Society"},{"issue":"6","key":"1_CR7","doi-asserted-by":"publisher","first-page":"1397","DOI":"10.1002\/asi.23786","volume":"68","author":"EP Baumer","year":"2017","unstructured":"Baumer, E.P., Mimno, D., Guha, S., Quan, E., Gay, G.K.: Comparing grounded theory and topic modeling: extreme divergence or unlikely convergence? J. Assoc. Inf. Sci. Technol. 68(6), 1397\u20131410 (2017)","journal-title":"J. Assoc. Inf. Sci. Technol."},{"key":"1_CR8","unstructured":"Black, M., Dana, K., Gaskins, K., Gaynier, C., Lemieux, A., McKinley, K.: The internet of things: can it find a foothold with mainstream audiences today. Technical report, The Nielsen Company (2014)"},{"issue":"Jan","key":"1_CR9","first-page":"993","volume":"3","author":"DM Blei","year":"2003","unstructured":"Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent Dirichlet allocation. J. Mach. Learn. Res. 3(Jan), 993\u20131022 (2003)","journal-title":"J. Mach. Learn. Res."},{"issue":"3","key":"1_CR10","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1177\/1461444814542311","volume":"18","author":"JR Brubaker","year":"2016","unstructured":"Brubaker, J.R., Ananny, M., Crawford, K.: Departing glances: a sociotechnical account of \u2018leaving\u2019 Grindr. New Med. Soc. 18(3), 373\u2013390 (2016)","journal-title":"New Med. Soc."},{"key":"1_CR11","unstructured":"Business Insider Intelligence: Many people still see smart home voice assistants as a novelty (2017). https:\/\/www.businessinsider.com\/voice-assistants-novelty-2017-1. Accessed Jan 2018"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Chancellor, S., Lin, Z., Goodman, E.L., Zerwas, S., De Choudhury, M.: Quantifying and predicting mental illness severity in online pro-eating disorder communities. In: Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing, pp. 1171\u20131184. ACM (2016)","DOI":"10.1145\/2818048.2819973"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Chen, F., Chiu, P., Lim, S.: Topic modeling of document metadata for visualizing collaborations over time. In: Proceedings of the 21st International Conference on Intelligent User Interfaces, pp. 108\u2013117. ACM (2016)","DOI":"10.1145\/2856767.2856787"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Cila, N., Smit, I., Giaccardi, E., Kr\u00f6se, B.: Products as agents: metaphors for designing the products of the IoT age. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 448\u2013459. ACM (2017)","DOI":"10.1145\/3025453.3025797"},{"issue":"3","key":"1_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3132031","volume":"1","author":"Meghan Clark","year":"2017","unstructured":"Clark, M., Newman, M.W., Dutta, P.: Devices and data and agents, oh my: how smart home abstractions prime end-user mental models. In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, vol. 1, no. 3, p. 44 (2017)","journal-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Clawson, J., Pater, J.A., Miller, A.D., Mynatt, E.D., Mamykina, L.: No longer wearing: investigating the abandonment of personal health-tracking technologies on craigslist. In: Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pp. 647\u2013658. ACM (2015)","DOI":"10.1145\/2750858.2807554"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Consolvo, S., et al.: Activity sensing in the wild: a field trial of ubifit garden. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1797\u20131806. ACM (2008)","DOI":"10.1145\/1357054.1357335"},{"issue":"2","key":"1_CR18","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1287\/orsc.5.2.121","volume":"5","author":"G DeSanctis","year":"1994","unstructured":"DeSanctis, G., Poole, M.S.: Capturing the complexity in advanced technology use: adaptive structuration theory. Organ. Sci. 5(2), 121\u2013147 (1994)","journal-title":"Organ. Sci."},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Epstein, D.A., Caraway, M., Johnston, C., Ping, A., Fogarty, J., Munson, S.A.: Beyond abandonment to next steps: understanding and designing for life after personal informatics tool use. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pp. 1109\u20131113. ACM (2016)","DOI":"10.1145\/2858036.2858045"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Epstein, D.A., Jacobson, B.H., Bales, E., McDonald, D.W., Munson, S.A.: From nobody cares to way to go!: a design framework for social sharing in personal informatics. In: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, pp. 1622\u20131636. ACM (2015)","DOI":"10.1145\/2675133.2675135"},{"issue":"2","key":"1_CR21","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1177\/001872675400700202","volume":"7","author":"L Festinger","year":"1954","unstructured":"Festinger, L.: A theory of social comparison processes. Hum. Relat. 7(2), 117\u2013140 (1954)","journal-title":"Hum. Relat."},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Fritz, T., Huang, E.M., Murphy, G.C., Zimmermann, T.: Persuasive technology in the real world: a study of long-term use of activity sensing devices for fitness. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 487\u2013496. ACM (2014)","DOI":"10.1145\/2556288.2557383"},{"key":"1_CR23","volume-title":"The Discovery of Grounded Theory: Strategies for Qualitative Theory","author":"BG Glaser","year":"1967","unstructured":"Glaser, B.G., Strauss, A.L.: The Discovery of Grounded Theory: Strategies for Qualitative Theory. Aldine Transaction, New Brunswick (1967)"},{"key":"1_CR24","unstructured":"Goffman, E.: The Presentation of Self in Everyday Life (1959). Garden City, NY (2002)"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Granovetter, M.S.: The strength of weak ties. In: Social Networks, pp. 347\u2013367. Elsevier (1977)","DOI":"10.1016\/B978-0-12-442450-0.50025-0"},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Guha, S., Baumer, E.P., Gay, G.K.: Regrets, I\u2019ve had a few: when regretful experiences do (and don\u2019t) compel users to leave Facebook. In: Proceedings of the 2018 ACM Conference on Supporting Groupwork, pp. 166\u2013177. ACM (2018)","DOI":"10.1145\/3148330.3148338"},{"issue":"1","key":"1_CR27","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1111\/j.1083-6101.2007.00396.x","volume":"13","author":"E Hargittai","year":"2007","unstructured":"Hargittai, E.: Whose space? Differences among users and non-users of social network sites. J. Comput.-Med. Commun. 13(1), 276\u2013297 (2007)","journal-title":"J. Comput.-Med. Commun."},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"Harrison, D., Marshall, P., Bianchi-Berthouze, N., Bird, J.: Activity tracking: barriers, workarounds and customisation. In: Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pp. 617\u2013621. ACM (2015)","DOI":"10.1145\/2750858.2805832"},{"key":"1_CR29","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/s00779-017-1099-9","volume":"22","author":"MH Jarrahi","year":"2018","unstructured":"Jarrahi, M.H., Gafinowitz, N., Shin, G.: Activity trackers, prior motivation, and perceived informational and motivational affordances. Pers. Ubiquitous Comput. 22, 433\u2013448 (2018)","journal-title":"Pers. Ubiquitous Comput."},{"key":"1_CR30","doi-asserted-by":"crossref","unstructured":"Kline, R.: Resisting consumer technology in rural America: the telephone and electrification. In: How Users Matter: The Co-construction of Users and Technology, pp. 51\u201366 (2003)","DOI":"10.7551\/mitpress\/3592.003.0005"},{"key":"1_CR31","unstructured":"Krackhardt, D., Nohria, N., Eccles, B.: The strength of strong ties. In: Networksin the Knowledge Economy, p. 82 (2003)"},{"key":"1_CR32","doi-asserted-by":"crossref","unstructured":"Lampe, C., Vitak, J., Ellison, N.: Users and nonusers: interactions between levels of adoption and social capital. In: Proceedings of the 2013 Conference on Computer Supported Cooperative Work, pp. 809\u2013820. ACM (2013)","DOI":"10.1145\/2441776.2441867"},{"key":"1_CR33","doi-asserted-by":"crossref","unstructured":"Lazar, A., Koehler, C., Tanenbaum, J., Nguyen, D.H.: Why we use and abandon smart devices. In: Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pp. 635\u2013646. ACM (2015)","DOI":"10.1145\/2750858.2804288"},{"issue":"93","key":"1_CR34","first-page":"1","volume":"200","author":"D Ledger","year":"2014","unstructured":"Ledger, D., McCaffrey, D.: Inside wearables: how the science of human behavior change offers the secret to long-term engagement. Endeavour Partners 200(93), 1 (2014)","journal-title":"Endeavour Partners"},{"key":"1_CR35","doi-asserted-by":"crossref","unstructured":"Luger, E., Sellen, A.: Like having a really bad PA: the gulf between user expectation and experience of conversational agents. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pp. 5286\u20135297. ACM (2016)","DOI":"10.1145\/2858036.2858288"},{"issue":"2","key":"1_CR36","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1093\/sf\/63.2.482","volume":"63","author":"PV Marsden","year":"1984","unstructured":"Marsden, P.V., Campbell, K.E.: Measuring tie strength. Soc. Forces 63(2), 482\u2013501 (1984)","journal-title":"Soc. Forces"},{"key":"1_CR37","doi-asserted-by":"crossref","unstructured":"Meyer, J., et al.: Exploring longitudinal use of activity trackers. In: 2016 IEEE International Conference on Healthcare Informatics (ICHI), pp. 198\u2013206. IEEE (2016)","DOI":"10.1109\/ICHI.2016.29"},{"key":"1_CR38","doi-asserted-by":"crossref","unstructured":"Meyer, J., Wasmann, M., Heuten, W., El Ali, A., Boll, S.C.: Identification and classification of usage patterns in long-term activity tracking. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 667\u2013678. ACM (2017)","DOI":"10.1145\/3025453.3025690"},{"key":"1_CR39","unstructured":"Naeini, P.E., et al.: Privacy expectations and preferences in an IoT world. In: Symposium on Usable Privacy and Security (SOUPS) (2017)"},{"issue":"5","key":"1_CR40","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1007\/s10488-013-0528-y","volume":"42","author":"LA Palinkas","year":"2015","unstructured":"Palinkas, L.A., Horwitz, S.M., Green, C.A., Wisdom, J.P., Duan, N., Hoagwood, K.: Purposeful sampling for qualitative data collection and analysis in mixed method implementation research. Adm. Policy Ment. Health Ment. Health Serv. Res. 42(5), 533\u2013544 (2015)","journal-title":"Adm. Policy Ment. Health Ment. Health Serv. Res."},{"key":"1_CR41","doi-asserted-by":"crossref","unstructured":"Patel, M., O\u2019Kane, A.A.: Contextual influences on the use and non-use of digital technology while exercising at the gym. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp. 2923\u20132932. ACM (2015)","DOI":"10.1145\/2702123.2702384"},{"key":"1_CR42","doi-asserted-by":"crossref","unstructured":"Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, p. 6. ACM (2012)","DOI":"10.1145\/2335356.2335364"},{"key":"1_CR43","doi-asserted-by":"crossref","unstructured":"Rantakari, J., Inget, V., Colley, A., H\u00e4kkil\u00e4, J.: Charting design preferences on wellness wearables. In: Proceedings of the 7th Augmented Human International Conference 2016, p. 28. ACM (2016)","DOI":"10.1145\/2875194.2875231"},{"key":"1_CR44","doi-asserted-by":"crossref","unstructured":"Rooksby, J., Rost, M., Morrison, A., Chalmers, M.C.: Personal tracking as lived informatics. In: Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems, pp. 1163\u20131172. ACM (2014)","DOI":"10.1145\/2556288.2557039"},{"issue":"1","key":"1_CR45","first-page":"2","volume":"10","author":"RM Ryan","year":"2008","unstructured":"Ryan, R.M., Patrick, H., Deci, E.L., Williams, G.C.: Facilitating health behaviour change and its maintenance: interventions based on self-determination theory. Eur. Health Psychol. 10(1), 2\u20135 (2008)","journal-title":"Eur. Health Psychol."},{"key":"1_CR46","doi-asserted-by":"crossref","unstructured":"Satchell, C., Dourish, P.: Beyond the user: use and non-use in HCI. In: Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group: Design: Open 24\/7, pp. 9\u201316. ACM (2009)","DOI":"10.1145\/1738826.1738829"},{"key":"1_CR47","doi-asserted-by":"crossref","unstructured":"Schoenebeck, S.Y.: Giving up Twitter for lent: how and why we take breaks from social media. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 773\u2013782. ACM (2014)","DOI":"10.1145\/2556288.2556983"},{"issue":"4\u20135","key":"1_CR48","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/j.poetic.2006.05.003","volume":"34","author":"N Selwyn","year":"2006","unstructured":"Selwyn, N.: Digital division or digital decision? A study of non-users and low-users of computers. Poetics 34(4\u20135), 273\u2013292 (2006)","journal-title":"Poetics"},{"key":"1_CR49","unstructured":"Shih, P.C., Han, K., Poole, E.S., Rosson, M.B., Carroll, J.M.: Use and adoption challenges of wearable activity trackers. In: IConference 2015 Proceedings (2015)"},{"key":"1_CR50","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/11748625_24","volume-title":"Pervasive Computing","author":"M Stringer","year":"2006","unstructured":"Stringer, M., Fitzpatrick, G., Harris, E.: Lessons for the future: experiences with the installation and use of today\u2019s domestic sensors and technologies. In: Fishkin, K.P., Schiele, B., Nixon, P., Quigley, A. (eds.) Pervasive 2006. LNCS, vol. 3968, pp. 383\u2013399. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11748625_24"},{"key":"1_CR51","doi-asserted-by":"crossref","unstructured":"Wyatt, S., Thomas, G., Terranova, T.: They came, they surfed, they went back to the beach: conceptualizing. In: Virtual Society, pp. 23\u201340 (2002)","DOI":"10.1093\/oso\/9780199248759.003.0002"},{"key":"1_CR52","doi-asserted-by":"crossref","unstructured":"Wyatt, S.M., Oudshoorn, N., Pinch, T.: Non-users also matter: the construction of users and non-users of the internet. In: Now Users Matter: The Co-construction of Users and Technology, pp. 67\u201379 (2003)","DOI":"10.7551\/mitpress\/3592.001.0001"},{"key":"1_CR53","doi-asserted-by":"crossref","unstructured":"Wyche, S.P., Schoenebeck, S.Y., Forte, A.: Facebook is a luxury: an exploratory study of social media use in rural Kenya. In: Proceedings of the 2013 Conference on Computer Supported Cooperative Work, pp. 33\u201344. ACM (2013)","DOI":"10.1145\/2441776.2441783"},{"key":"1_CR54","doi-asserted-by":"crossref","unstructured":"Yang, R., Newman, M.W.: Learning from a learning thermostat: lessons for intelligent systems for the home. In: Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pp. 93\u2013102. ACM (2013)","DOI":"10.1145\/2493432.2493489"}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction \u2013 INTERACT 2019"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-29390-1_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,22]],"date-time":"2024-07-22T17:43:06Z","timestamp":1721670186000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-29390-1_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030293895","9783030293901"],"references-count":54,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-29390-1_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"23 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INTERACT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paphos","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cyprus","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"interact2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/interact2019.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"PCS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"385","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"111","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"55","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48 other papers were accepted.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}