{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T02:46:46Z","timestamp":1773802006271,"version":"3.50.1"},"publisher-location":"Cham","reference-count":55,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030425036","type":"print"},{"value":"9783030425043","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-42504-3_1","type":"book-chapter","created":{"date-parts":[[2020,3,10]],"date-time":"2020-03-10T18:03:57Z","timestamp":1583863437000},"page":"3-16","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Privacy as Enabler of Innovation"],"prefix":"10.1007","author":[{"given":"Daniel","family":"Bachlechner","sequence":"first","affiliation":[]},{"given":"Marc","family":"van Lieshout","sequence":"additional","affiliation":[]},{"given":"Tjerk","family":"Timan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,6]]},"reference":[{"issue":"6","key":"1_CR1","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/MC.2013.186","volume":"46","author":"J Hemerly","year":"2013","unstructured":"Hemerly, J.: Public policy considerations for data-driven innovation. Computer 46(6), 25\u201331 (2013)","journal-title":"Computer"},{"key":"1_CR2","unstructured":"London Economics: Study on the Economic Benefits of Privacy-Enhancing Technologies (PETs) (2010). https:\/\/londoneconomics.co.uk\/wp-content\/uploads\/2011\/09\/17-Study-on-the-economic-benefits-of-privacy-enhancing-technologies-PETs.pdf"},{"issue":"1","key":"1_CR3","first-page":"115","volume":"19","author":"TZ Zarsky","year":"2015","unstructured":"Zarsky, T.Z.: The privacy-innovation conundrum. Lewis Clark Law Rev. 19(1), 115\u2013168 (2015)","journal-title":"Lewis Clark Law Rev."},{"key":"1_CR4","unstructured":"CISCO: Maximizing the Value of your Data Privacy Investments. Data Privacy Benchmark Study (2019). https:\/\/www.cisco.com\/c\/dam\/en_us\/about\/doing_business\/trust-center\/docs\/dpbs-2019.pdf"},{"key":"1_CR5","unstructured":"Dhanda, R.: Data Privacy Regulations\u2019 Implications on AI. https:\/\/securityboulevard.com\/2019\/09\/the-implications-of-data-privacy-regulations-on-ai\/. Accessed 29 Nov 2019"},{"key":"1_CR6","unstructured":"Ponemon Institute: Cost of a Data Breach Report 2019 (2019). https:\/\/www.ibm.com\/downloads\/cas\/ZBZLY7KL"},{"key":"1_CR7","unstructured":"The Harris Poll: IBM Survey Reveals Consumers Want Businesses to Do More to Actively Protect Their Data. https:\/\/theharrispoll.com\/ibm-survey-reveals-consumers-want-businesses-to-do-more-to-actively-protect-their-data\/. Accessed 31 Oct 2019"},{"key":"1_CR8","unstructured":"Fleck, M.: How GDPR is Unintentionally Driving the Next Decade of Technology. https:\/\/www.securityweek.com\/how-gdpr-unintentionally-driving-next-decade-technology. Accessed 27 Oct 2019"},{"key":"1_CR9","unstructured":"Kelly, H.: California passes strictest online privacy law in the country. https:\/\/money.cnn.com\/2018\/06\/28\/technology\/california-consumer-privacy-act\/index.html. Accessed 31 Oct 2019"},{"key":"1_CR10","volume-title":"The Universal Declaration of Human Rights. Origins, Drafting, and Intent","author":"J Morsink","year":"2009","unstructured":"Morsink, J.: The Universal Declaration of Human Rights. Origins, Drafting, and Intent. University of Pennsylvania Press, Philadelphia (2009)"},{"key":"1_CR11","first-page":"118","volume-title":"Four Essays on Liberty","author":"I Berlin","year":"1969","unstructured":"Berlin, I.: Two concepts of liberty. In: Berlin, I. (ed.) Four Essays on Liberty, pp. 118\u2013172. Oxford University Press, Oxford (1969)"},{"key":"1_CR12","volume-title":"Privacy and Freedom","author":"AF Westin","year":"1967","unstructured":"Westin, A.F.: Privacy and Freedom. Simon & Schuster, New York (1967)"},{"key":"1_CR13","volume-title":"The Governance of Privacy. Policy Instruments in Global Perspective","author":"CJ Bennett","year":"2006","unstructured":"Bennett, C.J., Raab, C.D.: The Governance of Privacy. Policy Instruments in Global Perspective. MIT Press, Cambridge (2006)"},{"key":"1_CR14","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-94-007-5170-5_1","volume-title":"European Data Protection. Coming of Age","author":"RL Finn","year":"2013","unstructured":"Finn, R.L., Wright, D., Friedewald, M.: Seven types of privacy. In: Gutwirth, S., Leenes, R., de Hert, P., Poullet, Y. (eds.) European Data Protection. Coming of Age, pp. 3\u201332. Springer, New York (2013). https:\/\/doi.org\/10.1007\/978-94-007-5170-5_1"},{"issue":"3","key":"1_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1111\/1467-8322.12430","volume":"34","author":"V Laterza","year":"2018","unstructured":"Laterza, V.: Cambridge Analytica, independent research and the national interest. Anthropol. Today 34(3), 1\u20132 (2018)","journal-title":"Anthropol. Today"},{"key":"1_CR16","unstructured":"Cadwalladr, C.: The Cambridge Analytica files. \u2018I made Steve Bannon\u2019s psychological warfare tool\u2019: meet the data war whistleblower. https:\/\/www.theguardian.com\/news\/2018\/mar\/17\/data-war-whistleblower-christopher-wylie-faceook-nix-bannon-trump. Accessed 31 Oct 2019"},{"key":"1_CR17","doi-asserted-by":"publisher","first-page":"47","DOI":"10.4337\/9781786435408.00008","volume-title":"Privacy in Public Space. Conceptual and Regulatory Challenges","author":"MH Nagenborg","year":"2017","unstructured":"Nagenborg, M.H.: Hidden in plain sight. In: Timan, T., Newell, B.C., Koops, B.-J. (eds.) Privacy in Public Space. Conceptual and Regulatory Challenges, pp. 47\u201363. Edward Elgar, Northampton (2017)"},{"key":"1_CR18","doi-asserted-by":"publisher","first-page":"211","DOI":"10.4337\/9781786435408.00016","volume-title":"Privacy in Public Space. Conceptual and Regulatory Challenges","author":"AE Scherr","year":"2017","unstructured":"Scherr, A.E.: Privacy in public spaces. The problem of out-of-body DNA. In: Timan, T., Newell, B.C., Koops, B.-J. (eds.) Privacy in Public Space. Conceptual and Regulatory Challenges, pp. 211\u2013241. Edward Elgar, Northampton (2017)"},{"issue":"4","key":"1_CR19","first-page":"483","volume":"38","author":"B-J Koops","year":"2017","unstructured":"Koops, B.-J., Newell, B.C., Timan, T., \u0160korv\u00e1nek, I., Chokrevski, T., Gali\u010d, M.: A typology of privacy. Univ. Pennsylvania J. Int. Law 38(4), 483\u2013575 (2017)","journal-title":"Univ. Pennsylvania J. Int. Law"},{"key":"1_CR20","unstructured":"OECD: The OECD Privacy Framework (2013). https:\/\/www.oecd.org\/sti\/ieconomy\/oecd_privacy_framework.pdf"},{"key":"1_CR21","unstructured":"Council of Europe: Convention 108+. Convention for the Protection of Individuals with regard to the Processing of Personal Data (2018). https:\/\/rm.coe.int\/convention-108-convention-for-the-protection-of-individuals-with-regar\/16808b36f1"},{"key":"1_CR22","unstructured":"Council of Europe: Chart of signatures and ratifications of Treaty 108. https:\/\/www.coe.int\/en\/web\/conventions\/full-list\/-\/conventions\/treaty\/108\/signatures?p_auth=jHKJqtBd. Accessed 30 Nov 2019"},{"key":"1_CR23","unstructured":"IAPP: 2018 Privacy Tech Vendor Report (2018). https:\/\/iapp.org\/media\/pdf\/resource_center\/2018-Privacy-Tech-Vendor-Report.pdf"},{"key":"1_CR24","unstructured":"IAPP: 2019 Privacy Tech Vendor Report (2019). https:\/\/iapp.org\/media\/pdf\/resource_center\/2019TechVendorReport.pdf"},{"key":"1_CR25","unstructured":"The Insight Partners: Privacy Management Software Market to 2027. https:\/\/www.theinsightpartners.com\/reports\/privacy-management-software-market\/?HK+MD. Accessed 30 Nov 2019"},{"key":"1_CR26","unstructured":"Market Study Report: Global Privacy Management Software Market Size, Status and Forecast 2019-2025. https:\/\/www.marketstudyreport.com\/reports\/global-privacy-management-software-market-size-status-and-forecast-2019-2025. Accessed 09 Dec 2019"},{"key":"1_CR27","unstructured":"Sawers, P.: 5 data privacy startups cashing in on GDPR. https:\/\/venturebeat.com\/2019\/07\/23\/5-data-privacy-startups-cashing-in-on-gdpr\/. Accessed 27 Oct 2019"},{"key":"1_CR28","unstructured":"Sawers, P.: Very Good Security raises $35 million to protect companies\u2019 private customer data. https:\/\/venturebeat.com\/2019\/10\/24\/very-good-security-raises-35-million-to-protect-companies-private-customer-data\/. Accessed 31 Oct 2019"},{"key":"1_CR29","unstructured":"Hern, A.: What is GDPR and how will it affect you? https:\/\/www.theguardian.com\/technology\/2018\/may\/21\/what-is-gdpr-and-how-will-it-affect-you. Accessed 27 Oct 2019"},{"key":"1_CR30","unstructured":"Bachlechner, D., La Fors, K., Sears, A.M.: The role of privacy-preserving technologies in the age of big data. In: Proceedings of the 13th Pre-ICIS Workshop on Information Security and Privacy (WISP 2018). AIS, Atlanta (2018)"},{"key":"1_CR31","unstructured":"IBM News Room: New Survey Finds Deep Consumer Anxiety over Data Privacy and Security. https:\/\/newsroom.ibm.com\/2018-04-15-New-Survey-Finds-Deep-Consumer-Anxiety-over-Data-Privacy-and-Security. Accessed 30 Nov 2019"},{"issue":"1","key":"1_CR32","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1287\/mnsc.2014.2023","volume":"61","author":"R Casadesus-Masanell","year":"2015","unstructured":"Casadesus-Masanell, R., Hervas-Drane, A.: Competing with privacy. Manage. Sci. 61(1), 229\u2013246 (2015)","journal-title":"Manage. Sci."},{"key":"1_CR33","unstructured":"Lichtblau, E., Apuzzo, M.: Justice Department Calls Apple\u2019s Refusal to Unlock iPhone a \u2018Marketing Strategy\u2019. https:\/\/www.nytimes.com\/2016\/02\/20\/business\/justice-department-calls-apples-refusal-to-unlock-iphone-a-marketing-strategy.html. Accessed 27 Oct 2019"},{"key":"1_CR34","unstructured":"Love, J.: Apple \u2018privacy czars\u2019 grapple with internal conflicts over user data. https:\/\/www.reuters.com\/article\/us-apple-encryption-privacy-insight-idUSKCN0WN0BO. Accessed 27 Oct 2019"},{"issue":"2","key":"1_CR35","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/s11747-016-0495-4","volume":"45","author":"KD Martin","year":"2017","unstructured":"Martin, K.D., Murphy, P.E.: The role of data privacy in marketing. J. Acad. Mark. Sci. 45(2), 135\u2013155 (2017)","journal-title":"J. Acad. Mark. Sci."},{"issue":"2","key":"1_CR36","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1257\/jel.54.2.442","volume":"54","author":"A Acquisti","year":"2016","unstructured":"Acquisti, A., Taylor, C., Wagman, L.: The economics of privacy. J. Econ. Lit. 54(2), 442\u2013492 (2016)","journal-title":"J. Econ. Lit."},{"key":"1_CR37","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.jbi.2014.04.012","volume":"50","author":"RH Khokhar","year":"2014","unstructured":"Khokhar, R.H., Chen, R., Fung, B.C.M., Lui, S.M.: Quantifying the costs and benefits of privacy-preserving health data publishing. J. Biomed. Inform. 50, 107\u2013121 (2014)","journal-title":"J. Biomed. Inform."},{"issue":"4","key":"1_CR38","first-page":"995","volume":"47","author":"TZ Zarsky","year":"2017","unstructured":"Zarsky, T.Z.: Incompatible: the GDPR in the age of big data. Seton Hall Law Rev. 47(4), 995\u20131020 (2017)","journal-title":"Seton Hall Law Rev."},{"issue":"2","key":"1_CR39","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/MIC.2018.022021660","volume":"22","author":"A Iyengar","year":"2018","unstructured":"Iyengar, A., Kundu, A., Pallis, G.: Healthcare informatics and privacy. IEEE Internet Comput. 22(2), 29\u201331 (2018)","journal-title":"IEEE Internet Comput."},{"key":"1_CR40","doi-asserted-by":"crossref","unstructured":"Mazhelis, O., Hamalainen, A., Asp, T., Tyrvainen, P.: Towards enabling privacy preserving smart city apps. In: Proceedings of the 2016 IEEE International Smart Cities Conference (ISC2), pp. 1\u20137. IEEE, Piscataway (2016)","DOI":"10.1109\/ISC2.2016.7580755"},{"key":"1_CR41","unstructured":"Pilkington, E.: Google\u2019s secret cache of medical data includes names and full details of millions \u2013 whistleblower. https:\/\/www.theguardian.com\/technology\/2019\/nov\/12\/google-medical-data-project-nightingale-secret-transfer-us-health-information. Accessed 29 Nov 2019"},{"key":"1_CR42","unstructured":"Jentzsch, N., Preibusch, S., Harasser, A.: Study on Monetising Privacy. An Economic Model for Pricing Personal Information (2012). https:\/\/www.enisa.europa.eu\/publications\/monetising-privacy\/at_download\/fullReport"},{"issue":"2","key":"1_CR43","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1086\/671754","volume":"42","author":"A Acquisti","year":"2013","unstructured":"Acquisti, A., John, L.K., Loewenstein, G.: What is privacy worth? J. Legal Stud. 42(2), 249\u2013274 (2013)","journal-title":"J. Legal Stud."},{"key":"1_CR44","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/978-3-319-18621-4_3","volume-title":"Privacy and Identity Management for the Future Internet in the Age of Globalisation","author":"M van Lieshout","year":"2015","unstructured":"van Lieshout, M.: The value of personal data. In: Camenisch, J., Fischer-H\u00fcbner, S., Hansen, M. (eds.) Privacy and Identity 2014. IAICT, vol. 457, pp. 26\u201338. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-18621-4_3"},{"issue":"1","key":"1_CR45","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1287\/orsc.11.1.35.12567","volume":"11","author":"SJ Milberg","year":"2000","unstructured":"Milberg, S.J., Smith, H.J., Burke, S.J.: Information privacy. Corporate management and national regulation. Organ. Sci. 11(1), 35\u201357 (2000)","journal-title":"Organ. Sci."},{"issue":"2","key":"1_CR46","doi-asserted-by":"publisher","first-page":"123","DOI":"10.2753\/JOA0091-3367360209","volume":"36","author":"S Dolnicar","year":"2007","unstructured":"Dolnicar, S., Jordaan, Y.: A market-oriented approach to responsibly managing information privacy concerns in direct marketing. J. Advert. 36(2), 123\u2013149 (2007)","journal-title":"J. Advert."},{"issue":"5","key":"1_CR47","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1080\/01972240490507956","volume":"20","author":"S Bellman","year":"2004","unstructured":"Bellman, S., Johnson, E.J., Kobrin, S.J., Lohse, G.L.: International differences in information privacy concerns. A global survey of consumers. Inf. Soc. 20(5), 313\u2013324 (2004)","journal-title":"Inf. Soc."},{"issue":"2","key":"1_CR48","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1023\/B:ETIN.0000047476.05912.3d","volume":"6","author":"L van Wel","year":"2004","unstructured":"van Wel, L., Royakkers, L.: Ethical issues in web data mining. Ethics Inf. Technol. 6(2), 129\u2013140 (2004)","journal-title":"Ethics Inf. Technol."},{"key":"1_CR49","unstructured":"Duhigg, C.: How Companies Learn Your Secrets. https:\/\/www.nytimes.com\/2012\/02\/19\/magazine\/shopping-habits.html. Accessed 27 Oct 2019"},{"issue":"1","key":"1_CR50","doi-asserted-by":"publisher","first-page":"26","DOI":"10.7146\/jod.9823","volume":"3","author":"S Miller","year":"2014","unstructured":"Miller, S.: Collaborative approaches needed to close the big data skills gap. JOD 3(1), 26 (2014)","journal-title":"JOD"},{"issue":"11","key":"1_CR51","doi-asserted-by":"publisher","first-page":"1134","DOI":"10.1016\/j.telpol.2014.10.002","volume":"38","author":"N Kshetri","year":"2014","unstructured":"Kshetri, N.: Big data\u2019s impact on privacy, security and consumer welfare. Telecommun. Policy 38(11), 1134\u20131145 (2014)","journal-title":"Telecommun. Policy"},{"issue":"1","key":"1_CR52","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11948-017-9872-8","volume":"24","author":"LH Segura Anaya","year":"2018","unstructured":"Segura Anaya, L.H., Alsadoon, A., Costadopoulos, N., Prasad, P.W.C.: Ethical implications of user perceptions of wearable devices. Sci. Eng. Ethics 24(1), 1\u201328 (2018)","journal-title":"Sci. Eng. Ethics"},{"issue":"4","key":"1_CR53","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/s10654-014-9909-0","volume":"29","author":"O Nyr\u00e9n","year":"2014","unstructured":"Nyr\u00e9n, O., Stenbeck, M., Gr\u00f6nberg, H.: The European Parliament proposal for the new EU General Data Protection Regulation may severely restrict European epidemiological research. Eur. J. Epidemiol. 29(4), 227\u2013230 (2014)","journal-title":"Eur. J. Epidemiol."},{"issue":"1","key":"1_CR54","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1080\/17579961.2018.1452176","volume":"10","author":"N Purtova","year":"2018","unstructured":"Purtova, N.: The law of everything. Broad concept of personal data and future of EU data protection law. Law Innov. Technol. 10(1), 40\u201381 (2018)","journal-title":"Law Innov. Technol."},{"key":"1_CR55","volume-title":"Data Ethics. The New Competitive Advantage","author":"G Hasselbalch","year":"2016","unstructured":"Hasselbalch, G., Tranberg, P.: Data Ethics. The New Competitive Advantage. Valby PubliShare, Copenhagen (2016)"}],"container-title":["IFIP Advances in Information and Communication Technology","Privacy and Identity Management. Data for Better Living: AI and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-42504-3_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,10]],"date-time":"2024-03-10T01:20:04Z","timestamp":1710033604000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-42504-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030425036","9783030425043"],"references-count":55,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-42504-3_1","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"6 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Privacy and Identity","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Summer School on Privacy and Identity Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Windisch","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Switzerland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"privacy-identity2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.ifip-summerschool.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"71% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}