{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T23:22:30Z","timestamp":1773789750781,"version":"3.50.1"},"publisher-location":"Cham","reference-count":47,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030402228","type":"print"},{"value":"9783030402235","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-40223-5_7","type":"book-chapter","created":{"date-parts":[[2020,2,8]],"date-time":"2020-02-08T10:02:50Z","timestamp":1581156170000},"page":"135-162","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Towards GDPR Compliant Software Design: A Formal Framework for Analyzing System Models"],"prefix":"10.1007","author":[{"given":"Evangelia","family":"Vanezi","sequence":"first","affiliation":[]},{"given":"Dimitrios","family":"Kouzapas","sequence":"additional","affiliation":[]},{"given":"Georgia M.","family":"Kapitsaki","sequence":"additional","affiliation":[]},{"given":"Anna","family":"Philippou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,9]]},"reference":[{"issue":"1","key":"7_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1006\/inco.1998.2740","volume":"148","author":"M Abadi","year":"1999","unstructured":"Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols: the Spi calculus. Inf. Comput. 148(1), 1\u201370 (1999)","journal-title":"Inf. Comput."},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Ahmadian, A.S., Str\u00fcber, D., Riediger, V., J\u00fcrjens, J.: Supporting privacy impact assessment by model-based privacy analysis. In: ACM Symposium on Applied Computing, pp. 1142\u20131149 (2018)","DOI":"10.1145\/3167132.3167288"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Backes, M., Hritcu, C., Maffei, M.: Type-checking zero-knowledge. In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, pp. 357\u2013370 (2008)","DOI":"10.1145\/1455770.1455816"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Basin, D., Debois, S., Hildebrandt, T.: On purpose and by necessity: compliance under the GDPR. In: Proceedings of FC 2018 (2018)","DOI":"10.1007\/978-3-662-58387-6_2"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Basso, T., Montecchi, L., Moraes, R., Jino, M., Bondavalli, A.: Towards a UML profile for privacy-aware applications. In: Proceedings of the IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT\/IUCC\/DASC\/PICOM 2015), pp. 371\u2013378. IEEE (2015)","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.53"},{"key":"7_CR6","volume-title":"Test-Driven Development: By Example","author":"K Beck","year":"2003","unstructured":"Beck, K.: Test-Driven Development: By Example. Addison-Wesley Professional, Boston (2003)"},{"issue":"2","key":"7_CR7","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1145\/1890028.1890031","volume":"33","author":"J Bengtson","year":"2011","unstructured":"Bengtson, J., Bhargavan, K., Fournet, C., Gordon, A.D., Maffeis, S.: Refinement types for secure implementations. ACM Trans. Program. Lang. Syst. 33(2), 8 (2011)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Boussetoua, R., Bennoui, H., Chaoui, A., Khalfaoui, K., Kerkouche, E.: An automatic approach to transform BPMN models to Pi-calculus. In: Proceedings of the International Conference of Computer Systems and Applications (AICCSA 2015), pp. 1\u20138. IEEE (2015)","DOI":"10.1109\/AICCSA.2015.7507176"},{"issue":"2","key":"7_CR9","doi-asserted-by":"publisher","first-page":"113","DOI":"10.3233\/JCS-2006-14202","volume":"14","author":"C Braghin","year":"2006","unstructured":"Braghin, C., Gorla, D., Sassone, V.: Role-based access control for a distributed calculus. J. Comput. Secur. 14(2), 113\u2013155 (2006)","journal-title":"J. Comput. Secur."},{"issue":"4","key":"7_CR10","doi-asserted-by":"publisher","first-page":"839","DOI":"10.1017\/S0960129509007762","volume":"19","author":"M Bugliesi","year":"2009","unstructured":"Bugliesi, M., Colazzo, D., Crafa, S., Macedonio, D.: A type system for discretionary access control. Math. Struct. Comput. Sci. 19(4), 839\u2013875 (2009)","journal-title":"Math. Struct. Comput. Sci."},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/3-540-44618-4_27","volume-title":"CONCUR 2000\u2014Concurrency Theory","author":"L Cardelli","year":"2000","unstructured":"Cardelli, L., Ghelli, G., Gordon, A.D.: Secrecy and group creation. In: Palamidessi, C. (ed.) CONCUR 2000. LNCS, vol. 1877, pp. 365\u2013379. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-44618-4_27"},{"key":"7_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/B978-044450813-3\/50026-6","volume-title":"Model Checking","author":"EM Clarke","year":"2001","unstructured":"Clarke, E.M., Grumberg, O., Peled, D.A.: Model Checking. MIT Press, Cambridge (2001)"},{"issue":"1\u20133","key":"7_CR13","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.tcs.2008.01.040","volume":"398","author":"AB Compagnoni","year":"2008","unstructured":"Compagnoni, A.B., Gunter, E.L., Bidinger, P.: Role-based access control for boxed ambients. Theoret. Comput. Sci. 398(1\u20133), 203\u2013216 (2008)","journal-title":"Theoret. Comput. Sci."},{"key":"7_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-319-24858-5_4","volume-title":"Security and Trust Management","author":"R Masellis De","year":"2015","unstructured":"De Masellis, R., Ghidini, C., Ranise, S.: A declarative framework for specifying and\u00a0enforcing purpose-aware policies. In: Foresti, S. (ed.) STM 2015. LNCS, vol. 9331, pp. 55\u201371. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24858-5_4"},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-20775-4_1","volume-title":"Functional and Constraint Logic Programming","author":"M Dezani-Ciancaglini","year":"2011","unstructured":"Dezani-Ciancaglini, M., Ghilezan, S., Jak\u0161i\u0107, S., Pantovi\u0107, J.: Types for role-based access control of dynamic web data. In: Mari\u00f1o, J. (ed.) WFLP 2010. LNCS, vol. 6559, pp. 1\u201329. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-20775-4_1"},{"key":"7_CR16","unstructured":"European Parliament and Council of the European Union: General data protection regulation. Official Journal of the European Union (2015)"},{"key":"7_CR17","unstructured":"Ferrara, P., Spoto, F.: Static analysis for GDPR compliance. In: ITASEC (2018)"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Fournet, C., Gordon, A., Maffeis, S.: A type discipline for authorization in distributed systems. In: 20th IEEE Computer Security Foundations Symposium, CSF 2007, 6\u20138 July 2007, Venice, Italy, pp. 31\u201348 (2007)","DOI":"10.1109\/CSF.2007.7"},{"key":"7_CR19","volume-title":"UML Distilled: A Brief Guide to the Standard Object Modeling Language","author":"M Fowler","year":"2004","unstructured":"Fowler, M.: UML Distilled: A Brief Guide to the Standard Object Modeling Language. Addison-Wesley Professional, Boston (2004)"},{"key":"7_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-46963-8_1","volume-title":"Current Trends in Web Engineering","author":"H Gjermundr\u00f8d","year":"2016","unstructured":"Gjermundr\u00f8d, H., Dionysiou, I., Costa, K.: privacyTracker: a privacy-by-design GDPR-compliant framework with verifiable data traceability controls. In: Casteleyn, S., Dolog, P., Pautasso, C. (eds.) ICWE 2016. LNCS, vol. 9881, pp. 3\u201315. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46963-8_1"},{"key":"7_CR21","volume-title":"Essential Business Process Modeling","author":"M Havey","year":"2005","unstructured":"Havey, M.: Essential Business Process Modeling. O\u2019Reilly Media Inc., Sebastopol (2005)"},{"key":"7_CR22","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511611063","volume-title":"A Distributed Pi-Calculus","author":"M Hennessy","year":"2007","unstructured":"Hennessy, M.: A Distributed Pi-Calculus. Cambridge University Press, Cambridge (2007)"},{"issue":"4\u20135","key":"7_CR23","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/s00236-005-0178-y","volume":"42","author":"M Hennessy","year":"2005","unstructured":"Hennessy, M., Rathke, J., Yoshida, N.: safeDpi: a language for controlling mobile code. Acta Inform. 42(4\u20135), 227\u2013290 (2005)","journal-title":"Acta Inform."},{"issue":"1","key":"7_CR24","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1006\/inco.2001.3089","volume":"173","author":"M Hennessy","year":"2002","unstructured":"Hennessy, M., Riely, J.: Resource access control in systems of mobile agents. Inf. Comput. 173(1), 82\u2013120 (2002)","journal-title":"Inf. Comput."},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Hintze, M., LaFever, G.: Meeting upcoming GDPR requirements while maximizing the full value of data analytics (2017)","DOI":"10.2139\/ssrn.2927540"},{"key":"7_CR26","unstructured":"Huth, D.: A pattern catalog for GDPR compliant data protection (2017)"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Jafari, M., Fong, P.W., Safavi-Naini, R., Barker, K., Sheppard, N.P.: Towards defining semantic foundations for purpose-based privacy policies. In: Proceedings of CODASPY 2011, pp. 213\u2013224. ACM (2011)","DOI":"10.1145\/1943513.1943541"},{"key":"7_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1007\/3-540-45800-X_32","volume-title":"UML 2002\u2014The Unified Modeling Language","author":"J J\u00fcrjens","year":"2002","unstructured":"J\u00fcrjens, J.: UMLsec: extending UML for secure systems development. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 412\u2013425. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45800-X_32"},{"issue":"3","key":"7_CR29","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s00766-008-0067-3","volume":"13","author":"C Kalloniatis","year":"2008","unstructured":"Kalloniatis, C., Kavakli, E., Gritzalis, S.: Addressing privacy requirements in system design: the PriS method. Requir. Eng. 13(3), 241\u2013255 (2008)","journal-title":"Requir. Eng."},{"key":"7_CR30","doi-asserted-by":"crossref","unstructured":"Kapitsaki, G., Ioannou, J., Cardoso, J., Pedrinaci, C.: Linked USDL privacy: describing privacy policies for services. In: 2018 IEEE International Conference on Web Services (ICWS), pp. 50\u201357. IEEE (2018)","DOI":"10.1109\/ICWS.2018.00014"},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"Kapitsaki, G.M., Kateros, D.A., Pappas, C.A., Tselikas, N.D., Venieris, I.S.: Model-driven development of composite web applications. In: Proceedings of the 10th International Conference on Information Integration and Web-Based Applications and Services, pp. 399\u2013402. ACM (2008)","DOI":"10.1145\/1497308.1497380"},{"key":"7_CR32","doi-asserted-by":"crossref","unstructured":"Kapitsaki, G.M., Venieris, I.S.: PCP: privacy-aware context profile towards context-aware application development. In: Proceedings of the 10th International Conference on Information Integration and Web-Based Applications and Services, pp. 104\u2013110. ACM (2008)","DOI":"10.1145\/1497308.1497332"},{"key":"7_CR33","unstructured":"Kouzapas, D., Philippou, A.: Privacy by typing in the $$\\pi $$\u03c0-calculus. Log. Methods Comput. Sci. 13(4) (2017)"},{"issue":"04","key":"7_CR34","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1142\/S0218194008003787","volume":"18","author":"VS Lam","year":"2008","unstructured":"Lam, V.S.: On $$\\pi $$\u03c0-calculus semantics as a formal basis for UML activity diagrams. Proc. Int. J. Softw. Eng. Knowl. Eng. 18(04), 541\u2013567 (2008)","journal-title":"Proc. Int. J. Softw. Eng. Knowl. Eng."},{"issue":"1","key":"7_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0890-5401(92)90008-4","volume":"100","author":"R Milner","year":"1992","unstructured":"Milner, R., Parrow, J., Walker, D.: A calculus of mobile processes, Parts I and II. Inf. Comput. 100(1), 1\u201377 (1992)","journal-title":"Inf. Comput."},{"key":"7_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/978-3-662-46663-6_11","volume-title":"Compiler Construction","author":"N Ng","year":"2015","unstructured":"Ng, N., de Figueiredo Coutinho, J.G., Yoshida, N.: Protocols by default - safe MPI code generation based on session types. In: Franke, B. (ed.) CC 2015. LNCS, vol. 9031, pp. 212\u2013232. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46663-6_11"},{"key":"7_CR37","doi-asserted-by":"crossref","unstructured":"Perera, C., McCormick, C., Bandara, A.K., Price, B.A., Nuseibeh, B.: Privacy-by-design framework for assessing internet of things applications and platforms. In: Proceedings of the 6th International Conference on the Internet of Things, pp. 83\u201392. ACM (2016)","DOI":"10.1145\/2991561.2991566"},{"issue":"1","key":"7_CR38","doi-asserted-by":"crossref","first-page":"tyy001","DOI":"10.1093\/cybsec\/tyy001","volume":"4","author":"E Politou","year":"2018","unstructured":"Politou, E., Alepis, E., Patsakis, C.: Forgetting personal data and revoking consent under the GDPR: challenges and proposed solutions. J. Cybersecur. 4(1), tyy001 (2018)","journal-title":"J. Cybersecur."},{"key":"7_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/978-3-319-68972-2_13","volume-title":"Fundamentals of Software Engineering","author":"S Riahi","year":"2017","unstructured":"Riahi, S., Khosravi, R., Ghassemi, F.: Purpose-based policy enforcement in actor-based systems. In: Dastani, M., Sirjani, M. (eds.) FSEN 2017. LNCS, vol. 10522, pp. 196\u2013211. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-68972-2_13"},{"key":"7_CR40","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/978-3-319-70241-4_16","volume-title":"The Practice of Enterprise Modeling","author":"M Robol","year":"2017","unstructured":"Robol, M., Salnitri, M., Giorgini, P.: Toward GDPR-compliant socio-technical systems: modeling language and reasoning framework. In: Poels, G., Gailly, F., Serral Asensio, E., Snoeck, M. (eds.) PoEM 2017. LNBIP, vol. 305, pp. 236\u2013250. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70241-4_16"},{"key":"7_CR41","first-page":"1409","volume":"26","author":"IS Rubinstein","year":"2011","unstructured":"Rubinstein, I.S.: Regulating privacy by design. Berkeley Technol. Law J. 26, 1409 (2011)","journal-title":"Berkeley Technol. Law J."},{"issue":"2","key":"7_CR42","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/MC.2006.58","volume":"39","author":"DC Schmidt","year":"2006","unstructured":"Schmidt, D.C.: Model-driven engineering. IEEE Comput. 39(2), 25 (2006)","journal-title":"IEEE Comput."},{"key":"7_CR43","unstructured":"Thatte, S.: XLANG: web services for business process design. Microsoft Corporation (2001)"},{"key":"7_CR44","unstructured":"Tschantz, M.C., Datta, A., Wing, J.M.: On the semantics of purpose requirements in privacy policies (2011). arXiv preprint arXiv:1102.4326"},{"key":"7_CR45","doi-asserted-by":"crossref","unstructured":"Tschantz, M.C., Datta, A., Wing, J.M.: Formalizing and enforcing purpose restrictions in privacy policies. In: Proceedings of SP 2012, pp. 176\u2013190. IEEE Computer Society (2012)","DOI":"10.1109\/SP.2012.21"},{"key":"7_CR46","doi-asserted-by":"crossref","unstructured":"Vanezi, E., Kapitsaki, G.M., Kouzapas, D., Philippou, A.: A formal modeling scheme for analyzing a software system design against the GDPR. In: Proceedings of the 14th International Conference on Evaluation of Novel Approaches to Software Engineering, ENASE 2019, pp. 68\u201379 (2019)","DOI":"10.5220\/0007722900680079"},{"key":"7_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/978-3-319-05119-2_3","volume-title":"Trustworthy Global Computing","author":"N Yoshida","year":"2014","unstructured":"Yoshida, N., Hu, R., Neykova, R., Ng, N.: The Scribble protocol language. In: Abadi, M., Lluch Lafuente, A. (eds.) TGC 2013. LNCS, vol. 8358, pp. 22\u201341. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-05119-2_3"}],"container-title":["Communications in Computer and Information Science","Evaluation of Novel Approaches to Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-40223-5_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,26]],"date-time":"2021-02-26T16:59:26Z","timestamp":1614358766000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-40223-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030402228","9783030402235"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-40223-5_7","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"9 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ENASE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Evaluation of Novel Approaches to Software Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Heraklion, Crete","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 May 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 May 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"enase2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.enase.org\/?y=2019","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"PRIMORIS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"102","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}