{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T12:45:06Z","timestamp":1776084306700,"version":"3.50.1"},"publisher-location":"Cham","reference-count":49,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030437244","type":"print"},{"value":"9783030437251","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-43725-1_18","type":"book-chapter","created":{"date-parts":[[2020,3,12]],"date-time":"2020-03-12T19:04:35Z","timestamp":1584039875000},"page":"257-271","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["How to Assess the Usability Metrics of E-Voting Schemes"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7129-9642","authenticated-orcid":false,"given":"Karola","family":"Marky","sequence":"first","affiliation":[]},{"given":"Marie-Laure","family":"Zollinger","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8127-0592","authenticated-orcid":false,"given":"Markus","family":"Funk","sequence":"additional","affiliation":[]},{"given":"Peter Y. A.","family":"Ryan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4713-5327","authenticated-orcid":false,"given":"Max","family":"M\u00fchlh\u00e4user","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,13]]},"reference":[{"issue":"3","key":"18_CR1","first-page":"26","volume":"2","author":"CZ Acemyan","year":"2014","unstructured":"Acemyan, C.Z., Kortum, P., Byrne, M.D., Wallach, D.S.: Usability of voter verifiable, end-to-end voting systems: Baseline data for helios, pr\u00eat \u00e0 voter, and scantegrity ii. USENIX J. Election Technol. Syst. (JETS) 2(3), 26\u201356 (2014)","journal-title":"USENIX J. Election Technol. Syst. (JETS)"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Acemyan, C.Z., Kortum, P., Byrne, M.D., Wallach, D.S.: Summative usability assessments of STAR-Vote: a cryptographically secure e2e voting system that has been empirically proven to be easy to use. Hum. factors, 1\u201324 (2018)","DOI":"10.1177\/0018720818812586"},{"key":"18_CR3","volume-title":"Measuring the User Experience: Collecting, Analyzing, and Presenting Usability Metrics","author":"W Albert","year":"2013","unstructured":"Albert, W., Tullis, T.: Measuring the User Experience: Collecting, Analyzing, and Presenting Usability Metrics. Newnes, Boston (2013)"},{"key":"18_CR4","unstructured":"Ali, S.T., Murray, J.: An overview of end-to-end verifiable voting systems. In: Real-World Electronic Voting: Design, Analysis and Deployment, pp. 171\u2013218. CRC Press (2016)"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Bederson, B.B., Lee, B., Sherman, R.M., Herrnson, P.S., Niemi, R.G.: Electronic voting system usability issues. In: SIGCHI Conference on Human Factors in Computing Systems (CHI), pp. 145\u2013152. ACM (2003)","DOI":"10.1145\/642611.642638"},{"key":"18_CR6","unstructured":"Benaloh, J., Rivest, R., Ryan, P.Y., Stark, P., Teague, V., Vora, P.: End-to-end verifiability, pp. 1\u20137 (2015). \nhttps:\/\/arxiv.org\/pdf\/1504.03778.pdf"},{"issue":"3","key":"18_CR7","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1109\/47.867942","volume":"43","author":"T Boren","year":"2000","unstructured":"Boren, T., Ramey, J.: Thinking aloud: reconciling theory and practice. IEEE Trans. Prof. Commun. 43(3), 261\u2013278 (2000)","journal-title":"IEEE Trans. Prof. Commun."},{"issue":"194","key":"18_CR8","first-page":"4","volume":"189","author":"J Brooke","year":"1996","unstructured":"Brooke, J.: SUS - a quick and dirty usability scale. Usability Eval. Ind. 189(194), 4\u20137 (1996)","journal-title":"Usability Eval. Ind."},{"issue":"7","key":"18_CR9","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/s12243-016-0510-2","volume":"71","author":"J Budurushi","year":"2016","unstructured":"Budurushi, J., Renaud, K., Volkamer, M., Woide, M.: An investigation into the usability of electronic voting systems for complex elections. Ann. Telecommun. 71(7), 309\u2013322 (2016). \nhttps:\/\/doi.org\/10.1007\/s12243-016-0510-2","journal-title":"Ann. Telecommun."},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Byrne, M.D., Greene, K.K., Everett, S.P.: Usability of voting systems: baseline data for paper, punch cards, and lever machines. In: SIGCHI Conference on Human Factors in Computing Systems (CHI), pp. 171\u2013180. ACM (2007)","DOI":"10.1145\/1240624.1240653"},{"key":"18_CR11","unstructured":"Campbell, B.A., Byrne, M.D.: Now do voters notice review screen anomalies? A look at voting system usability. In: Conference on Electronic Voting Technology\/Workshop on Trustworthy Elections (EVT\/WOTE). USENIX Association (2009)"},{"issue":"1","key":"18_CR12","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MSECP.2004.1264852","volume":"2","author":"D Chaum","year":"2004","unstructured":"Chaum, D.: Secret-ballot receipts: true voter-verifiable elections. IEEE Secur. Priv. 2(1), 38\u201347 (2004)","journal-title":"IEEE Secur. Priv."},{"issue":"1","key":"18_CR13","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.ijhcs.2008.09.010","volume":"67","author":"FG Conrad","year":"2009","unstructured":"Conrad, F.G., et al.: Electronic voting eliminates hanging chads but introduces new usability challenges. Int. J. Hum.-Comput. Stud. 67(1), 111\u2013124 (2009)","journal-title":"Int. J. Hum.-Comput. Stud."},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Cortier, V., Galindo, D., K\u00fcsters, R., Mueller, J., Truderung, T.: SoK: verifiability notions for e-voting protocols. In: Symposium on Security and Privacy (S&P), pp. 779\u2013798. IEEE (2016)","DOI":"10.1109\/SP.2016.52"},{"key":"18_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-319-47413-7_14","volume-title":"Decision and Game Theory for Security","author":"C Culnane","year":"2016","unstructured":"Culnane, C., Teague, V.: Strategies for voter-initiated election audits. In: Zhu, Q., Alpcan, T., Panaousis, E., Tambe, M., Casey, W. (eds.) GameSec 2016. LNCS, vol. 9996, pp. 235\u2013247. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-47413-7_14"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Distler, V., Zollinger, M.L., Lallemand, C., R\u00f8nne, P.B., Ryan, P.Y., Koenig, V.: Security-visible, yet unseen? How displaying security mechanisms impacts user experience and perceived security. In: CHI Conference on Human Factors in Computing Systems, CHI 2019. ACM (2019)","DOI":"10.1145\/3290605.3300835"},{"key":"18_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/978-3-662-53357-4_16","volume-title":"Financial Cryptography and Data Security","author":"A Escala","year":"2016","unstructured":"Escala, A., Guasch, S., Herranz, J., Morillo, P.: Universal cast-as-intended verifiability. In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 233\u2013250. Springer, Heidelberg (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-662-53357-4_16"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Everett, S.P., Byrne, M.D., Greene, K.K.: Measuring the usability of paper ballots: efficiency, effectiveness, and satisfaction. In: Proceedings of the Human Factors and Ergonomics Society Annual Meeting, vol. 50, no. 24, pp. 2547\u20132551 (2006)","DOI":"10.1177\/154193120605002407"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Everett, S.P., et al.: Electronic voting machines versus traditional methods: improved preference, similar performance. In: SIGCHI Conference on Human Factors in Computing Systems (CHI), pp. 883\u2013892. ACM (2008)","DOI":"10.1145\/1357054.1357195"},{"issue":"4","key":"18_CR20","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/s10209-011-0253-9","volume":"11","author":"KS Fuglerud","year":"2012","unstructured":"Fuglerud, K.S., R\u00f8ssvoll, T.H.: An evaluation of web-based voting usability and accessibility. Univ. Access Inf. Soc. 11(4), 359\u2013373 (2012). \nhttps:\/\/doi.org\/10.1007\/s10209-011-0253-9","journal-title":"Univ. Access Inf. Soc."},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"Gibson, J.P., MacNamara, D., Oakley, K.: Just like paper and the 3-colour protocol: a voting interface requirements engineering case study. In: International Workshop on Requirements Engineering for Electronic Voting Systems, pp. 66\u201375. IEEE (2011)","DOI":"10.1109\/REVOTE.2011.6045917"},{"key":"18_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-32747-6_1","volume-title":"E-Voting and Identity","author":"K Gj\u00f8steen","year":"2012","unstructured":"Gj\u00f8steen, K.: The Norwegian internet voting protocol. In: Kiayias, A., Lipmaa, H. (eds.) Vote-ID 2011. LNCS, vol. 7187, pp. 1\u201318. Springer, Heidelberg (2012). \nhttps:\/\/doi.org\/10.1007\/978-3-642-32747-6_1"},{"key":"18_CR23","unstructured":"Greene, K.K., Byrne, M.D., Everett, S.P.: A comparison of usability between voting methods. In: Electronic Voting Technology Workshop (EVT). USENIX Association (2006)"},{"key":"18_CR24","series-title":"Wiley International Encyclopedia of Marketing","doi-asserted-by":"publisher","DOI":"10.1002\/9781444316568.wiem02057","volume-title":"Social desirability bias","author":"P Grimm","year":"2010","unstructured":"Grimm, P.: Social desirability bias. Wiley International Encyclopedia of Marketing. Wiley, Hoboken (2010)"},{"key":"18_CR25","unstructured":"Herrnson, P.S., Niemi, R.G., Hanmer, M.J., Bederson, B.B., Conrad, F.G., Traugott, M.: The importance of usability testing of voting systems. In: Electronic Voting Technology Workshop (EVT) (2006)"},{"issue":"4","key":"18_CR26","first-page":"180","volume":"2","author":"M Jong de","year":"2007","unstructured":"de Jong, M., van Hoof, J., Gosselt, J.: User research of a voting machine: Preliminary findings and experiences. J. Usability Stud. 2(4), 180\u2013189 (2007)","journal-title":"J. Usability Stud."},{"key":"18_CR27","doi-asserted-by":"crossref","unstructured":"Karayumak, F., Kauer, M., Olembo, M.M., Volk, T., Volkamer, M.: User study of the improved Helios voting system interfaces. In: Workshop on Socio-Technical Aspects in Security and Trust (STAST), pp. 37\u201344. IEEE (2011)","DOI":"10.1109\/STAST.2011.6059254"},{"issue":"3","key":"18_CR28","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MSP.2017.70","volume":"15","author":"O Kulyk","year":"2017","unstructured":"Kulyk, O., Neumann, S., Budurushi, J., Volkamer, M.: Nothing comes for free: How much usability can you sacrifice for security? IEEE Secur. Priv. 15(3), 24\u201329 (2017)","journal-title":"IEEE Secur. Priv."},{"key":"18_CR29","first-page":"256","volume":"500","author":"SJ Laskowski","year":"2004","unstructured":"Laskowski, S.J., Autry, M., Cugini, J., Killam, W., Yen, J.: Improving the usability and accessibility of voting systems and products. NIST Spec. Publ. 500, 256 (2004)","journal-title":"NIST Spec. Publ."},{"key":"18_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-540-89350-9_6","volume-title":"HCI and Usability for Education and Work","author":"B Laugwitz","year":"2008","unstructured":"Laugwitz, B., Held, T., Schrepp, M.: Construction and evaluation of a user experience questionnaire. In: Holzinger, A. (ed.) USAB 2008. LNCS, vol. 5298, pp. 63\u201376. Springer, Heidelberg (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-89350-9_6"},{"key":"18_CR31","unstructured":"Mac Namara, D., Scully, T., Gibson, P.: Dualvote addressing usability and verifiability issues in electronic voting systems (2011). \nhttp:\/\/citeseerx.ist.psu.edu\/viewdoc\/summary?doi=10.1.1.399.7284"},{"key":"18_CR32","unstructured":"MacNamara, D., Carmody, F., Scully, T., Oakley, K., Quane, E., Gibson, J.P.: Dual vote: a novel user interface for e-voting systems. In: International Conference on Interfaces and Human Computer Interaction, pp. 129\u2013138. IADIS (2010)"},{"key":"18_CR33","unstructured":"MacNamara, D., Gibson, P., Oakley, K.: A preliminary study on a dualvote and Pr\u00eat \u00e0 Voter hybrid system. In: Conference for E-Democracy and Open Government, p. 77. Edition-Donau-Univ. Krems (2012)"},{"key":"18_CR34","doi-asserted-by":"crossref","unstructured":"Marky, K., Kulyk, O., Renaud, K., Volkamer, M.: What did I really vote for? On the usability of verifiable e-voting schemes. In: CHI Conference on Human Factors in Computing Systems (CHI), pp. 176:1\u2013176:13. ACM (2018)","DOI":"10.1145\/3173574.3173750"},{"key":"18_CR35","unstructured":"Marky, K., Kulyk, O., Volkamer, M.: Comparative usability evaluation of cast-as-intended verification approaches in internet voting. In: SICHERHEIT 2018, pp. 197\u2013208. Lecture Notes in Informatics (LNI), Gesellschaft f\u00fcr Informatik (2018)"},{"key":"18_CR36","doi-asserted-by":"crossref","unstructured":"Marky, K., Schmitz, M., Lange, F., M\u00fchlh\u00e4user, M.: Usability of code voting modalities. In: Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, CHI EA 2019, pp. LBW2221:1\u2013LBW2221:6. ACM (2019)","DOI":"10.1145\/3290607.3312971"},{"issue":"11","key":"18_CR37","first-page":"1","volume":"3","author":"C Nancarrow","year":"2000","unstructured":"Nancarrow, C., Brace, I.: Saying the \u201cright thing\u201d: coping with social desirability bias in marketing research. Bristol Bus. Sch. Teach. Res. Rev. 3(11), 1\u201311 (2000)","journal-title":"Bristol Bus. Sch. Teach. Res. Rev."},{"key":"18_CR38","unstructured":"Neumann, S.: Evaluation and improvement of internet voting schemes based on legally-founded security requirements. Ph.D. thesis, Technische Universit\u00e4t Darmstadt (2016)"},{"key":"18_CR39","doi-asserted-by":"crossref","unstructured":"Olembo, M.M., Volkamer, M.: E-voting system usability: Lessons for interface design, user studies, and usability criteria. In: Human-Centered System Design for Electronic Governance, pp. 172\u2013201. IGI Global (2013)","DOI":"10.4018\/978-1-4666-3640-8.ch011"},{"key":"18_CR40","doi-asserted-by":"crossref","unstructured":"Patrick, A.: Ecological validity in studies of security and human behaviour. In: Symposium on Usable Privacy and Security (SOUPS) (2009)","DOI":"10.1145\/1572532.1572592"},{"key":"18_CR41","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/j.csi.2017.08.004","volume":"55","author":"P Realpe-Mu\u00f1oz","year":"2017","unstructured":"Realpe-Mu\u00f1oz, P., Collazos, C.A., Hurtado, J., Granollers, T., Mu\u00f1oz-Arteaga, J., Velasco-Medina, J.: Eye tracking-based behavioral study of users using e-voting systems. Comput. Stan. Interfaces 55, 182\u2013195 (2017)","journal-title":"Comput. Stan. Interfaces"},{"issue":"1","key":"18_CR42","first-page":"7","volume":"2","author":"T Selker","year":"2006","unstructured":"Selker, T., Rosenzweig, E., Pandolfo, A.: A methodology for testing voting systems. J. Usability Stud. 2(1), 7\u201321 (2006)","journal-title":"J. Usability Stud."},{"key":"18_CR43","unstructured":"Sherman, A.T., et al.: Scantegrity mock election at Takoma Park. In: International Conference on Electronic Voting (EVOTE), pp. 45\u201361. LNI, Gesellschaft f\u00fcr Informatik (2010)"},{"key":"18_CR44","unstructured":"Standardization, I.O.F.: ISO 9241\u201311: Ergonomics of human system interaction - part 11: Guidance on usability (1998)"},{"key":"18_CR45","unstructured":"Standardization, I.O.F.: ISO 9241\u2013210: Part 210: Human-centred design for interactive systems (2015)"},{"key":"18_CR46","unstructured":"Strafgesetzbuch (StGB): \u00a7107c Verletzung des Wahlgeheimnisses. \nhttps:\/\/www.gesetze-im-internet.de\/stgb\/__107c.html"},{"key":"18_CR47","unstructured":"Van Hoof, J.J., Gosselt, J.F., de Jong, M.D.: The reliability and usability of the NEDAP voting machine: a pilot study. University of Twente Faculty of Behavioural Sciences Department of Technical and Professional Communication (2007)"},{"key":"18_CR48","unstructured":"Weber, J.L., Hengartner, U.: Usability study of the open audit voting system Helios. \nhttp:\/\/www.jannaweber.com\/wp-content\/uploads\/2009\/09\/858Helios.pdf\n\n (2009)"},{"key":"18_CR49","unstructured":"Winckler, M., et al.: Assessing the usability of open verifiable e-voting systems: a trial with the system pr\u00eat \u00e0 voter. In: International Conference on Theory and Practice of Electronic Governance (ICEGOV), pp. 281\u2013296. ACM (2009)"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-43725-1_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,13]],"date-time":"2020-03-13T06:44:04Z","timestamp":1584081844000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-43725-1_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030437244","9783030437251"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-43725-1_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"13 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"St. Kitts","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Saint Kitts and Nevis","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 February 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 February 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc19.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"HotCRP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"178","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,08","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7,6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}