{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T13:39:22Z","timestamp":1765805962243,"version":"3.40.3"},"publisher-location":"Cham","reference-count":68,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030450014"},{"type":"electronic","value":"9783030450021"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-45002-1_14","type":"book-chapter","created":{"date-parts":[[2020,4,6]],"date-time":"2020-04-06T15:04:25Z","timestamp":1586185465000},"page":"159-171","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["On the Ethics of Using Publicly-Available Data"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9411-2094","authenticated-orcid":false,"given":"Antony K.","family":"Cooper","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8683-8047","authenticated-orcid":false,"given":"Serena","family":"Coetzee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,1]]},"reference":[{"key":"14_CR1","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.landurbplan.2015.02.020","volume":"142","author":"T Shelton","year":"2015","unstructured":"Shelton, T., Poorthuis, A., Zook, M.: Social media and the city: rethinking urban socio-spatial inequality using user-generated geographic information. Landscape Urban Plan. 142, 198\u2013211 (2015)","journal-title":"Landscape Urban Plan."},{"key":"14_CR2","unstructured":"Engelhardt, T.: The NSA mistakes omniscience for omnipotence. The Nation, 12 November 2013"},{"key":"14_CR3","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1016\/j.jclinepi.2015.04.015","volume":"70","author":"J Ioannidis","year":"2016","unstructured":"Ioannidis, J.: Anticipating consequences of sharing raw data and code and of awarding badges for sharing. J. Clin. Epidemiol. 70, 258\u2013260 (2016). https:\/\/doi.org\/10.1016\/j.jclinepi.2015.04.015","journal-title":"J. Clin. Epidemiol."},{"issue":"1","key":"14_CR4","first-page":"180","volume":"28","author":"L Asheim","year":"1953","unstructured":"Asheim, L.: Selection and censorship: a reappraisal. Wilson Libr. Bull. (R) 28(1), 180\u2013184 (1953)","journal-title":"Wilson Libr. Bull. (R)"},{"issue":"3","key":"14_CR5","first-page":"63","volume":"58","author":"L Asheim","year":"1983","unstructured":"Asheim, L.: Not censorship but selection. Wilson Libr. Bull. 58(3), 63\u201367 (1983)","journal-title":"Wilson Libr. Bull."},{"key":"14_CR6","unstructured":"Channel24: A frustrated Toya Delazy leaks her own album online, 14 May 2015"},{"key":"14_CR7","unstructured":"Ilves, T.H.: Keynote Address by President Toomas Hendrik Ilves at Panel Discussion \u201cA Secure and Free Internet\u201d, the UN Dag Hammarskj\u00f6ld Library Auditorium. Permanent Representation of Estonia to the UN, 29 September 2013"},{"key":"14_CR8","volume-title":"Ethics for Accountants and Auditors","author":"L Kretzschmar","year":"2013","unstructured":"Kretzschmar, L., et al.: Ethics for Accountants and Auditors, 3rd edn. Oxford University Press, Cape Town (2013)","edition":"3"},{"issue":"6","key":"14_CR9","doi-asserted-by":"publisher","first-page":"1063","DOI":"10.1016\/j.omega.2008.10.002","volume":"37","author":"AK Cooper","year":"2009","unstructured":"Cooper, A.K., Ittmann, H.W., Stylianides, T., Schmitz, P.M.U.: Ethical issues in tracking cellphones at an event. OMEGA 37(6), 1063\u20131072 (2009)","journal-title":"OMEGA"},{"key":"14_CR10","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1016\/j.ejor.2019.04.036","volume":"281","author":"R Vidgen","year":"2020","unstructured":"Vidgen, R., Hindle, G., Randolph, I.: Exploring the ethical implications of business analytics with a business ethics canvas. Eur. J. Oper. Res. 281, 491\u2013501 (2020)","journal-title":"Eur. J. Oper. Res."},{"key":"14_CR11","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/s13278-019-0616-4","volume":"10","author":"A Yavary","year":"2020","unstructured":"Yavary, A., Sajedi, H., Saniee Abadeh, M.: Information verification in social networks based on user feedback and news agencies. Soc. Netw. Anal. Min. 10, 2 (2020). https:\/\/doi.org\/10.1007\/s13278-019-0616-4","journal-title":"Soc. Netw. Anal. Min."},{"key":"14_CR12","unstructured":"Cooper, A.K., Schmitz, P.M.U., Krygsman, S.C.: Tracking cellular telephones to build transport models. In: South African Transportation Conference (SATC), Pretoria, 16\u201319 August 2010"},{"issue":"5","key":"14_CR13","doi-asserted-by":"publisher","first-page":"193","DOI":"10.2307\/1321160","volume":"4","author":"SD Warren","year":"1890","unstructured":"Warren, S.D., Brandeis, L.D.: The right to privacy. Harvard Law Rev. 4(5), 193\u2013220 (1890)","journal-title":"Harvard Law Rev."},{"key":"14_CR14","unstructured":"Brandeis, L.D.: Olmstead v. United States\/Opinion of the Court, 277 U.S. 438, United States Supreme Court, dissenting opinion, 4 June 1928"},{"key":"14_CR15","unstructured":"OAIC: What is privacy? Office of the Australian Information Commissioner (OAIC) (2015). http:\/\/www.privacy.gov.au\/aboutprivacy\/what"},{"key":"14_CR16","unstructured":"European Parliament: Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation). OJ L 119, 4.5.2016, p. 1, 23 May 2018"},{"key":"14_CR17","unstructured":"South Africa: Protection of Personal Information Act (Act No 4 of 2013) (2013)"},{"key":"14_CR18","unstructured":"Von Drehle, D.: The surveillance society: secrets are so 20th century now that we have the ability to collect and store billions of pieces of data forever. TIME, 1 August 2013"},{"issue":"4","key":"14_CR19","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/s11571-012-9230-0","volume":"7","author":"L Farwell","year":"2013","unstructured":"Farwell, L., Richardson, D.C., Richardson, G.M.: Brain fingerprinting field studies comparing p300-mermer and p300 brainwave responses in the detection of concealed information. Cogn. Neurodyn. 7(4), 263\u2013299 (2013)","journal-title":"Cogn. Neurodyn."},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Meijer, E.H., Ben-Shakhar, G., Verschuere, B., Donchin, E.: A comment on Farwell (2012): brain fingerprinting: a comprehensive tutorial review of detection of concealed information with event-related brain potentials. Cogn. Neurodyn. 7(2), 155\u2013158 (2013)","DOI":"10.1007\/s11571-012-9217-x"},{"key":"14_CR21","unstructured":"Holputch, A.: Brazil\u2019s controversial plan to extricate the internet from US control. The Guardian, 20 September 2013"},{"key":"14_CR22","unstructured":"Cowie, J.: The new threat: targeted internet traffic misdirection. Renesys Blog. http:\/\/www.renesys.com\/2013\/11\/mitm-internet-hijacking\/. Accessed 19 Nov 2013"},{"key":"14_CR23","volume-title":"The Role of Terrestrial Vegetation in the Global Carbon Cycle: Measurement by Remote Sensing","author":"JD Erickson","year":"1984","unstructured":"Erickson, J.D.: The LACIE experiment in satellite aided monitoring of global crop production. In: Woodwell, G.M. (ed.) The Role of Terrestrial Vegetation in the Global Carbon Cycle: Measurement by Remote Sensing. Wiley, Hoboken (1984)"},{"key":"14_CR24","unstructured":"Hudson, A.: Is small print in online contracts enforceable? BBC News: Technology, 5 June 2013"},{"key":"14_CR25","doi-asserted-by":"publisher","unstructured":"Jiow, H.J., Lin, J.: The influence of parental factors on children\u2019s receptiveness towards mobile phone location disclosure services. First Monday 18(1) (2013) https:\/\/doi.org\/10.5210\/fm.v18i1.4284","DOI":"10.5210\/fm.v18i1.4284"},{"key":"14_CR26","unstructured":"Schweller, R.L.: The age of entropy: why the new world order won\u2019t be orderly. Foreign Aff. (2014). https:\/\/www.foreignaffairs.com\/articles\/united-states\/2014-06-16\/age-entropy"},{"key":"14_CR27","unstructured":"Investors.com: So Why Didn\u2019t NSA Catch The Tsarnaev Brothers? Investor\u2019s Business Daily, Inc., 13 June 2013"},{"key":"14_CR28","unstructured":"Leonnig, C., O\u2019Keefe, E.: Contractor would not have hired shooter if past brushes with law were known. Wash. Post (2013)"},{"issue":"2821","key":"14_CR29","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/S0262-4079(11)61710-7","volume":"211","author":"A Ananthaswamy","year":"2011","unstructured":"Ananthaswamy, A.: Welcome to the age of the splinternet. N. Sci. 211(2821), 42\u201345 (2011)","journal-title":"N. Sci."},{"issue":"49","key":"14_CR30","first-page":"62","volume":"142","author":"P Elmer-Dewitt","year":"1993","unstructured":"Elmer-Dewitt, P.: First nation in cyberspace. TIME Int. 142(49), 62\u201364 (1993)","journal-title":"TIME Int."},{"key":"14_CR31","unstructured":"Bentham, J.: Panopticon; or the Inspection-House: Containing the Idea of a New Principle of Construction Applicable to Any Sort of Establishment, \u2026. Letters of Bentham (1787). Transcription and HTML by Cartome, 16 June 2001, from Bentham, Jeremy The Panopticon Writings. Ed. Miran Bozovic (London: Verso, 1995). p. 29\u201395"},{"key":"14_CR32","unstructured":"Foucault, M.: \u2018Panopticism\u2019 from \u2018discipline & punish: the birth of the prison\u2019. Race\/Ethn.: Multi. Glob. Contexts 2(1), 1\u201312 (2008). English Translation by Alan Sheridan, 1977 (New York: Pantheon). Originally published in French in 1975 as Surveiller et Punir (Paris: Editions Gallimard)"},{"key":"14_CR33","unstructured":"Brunon-Ernst, A.: Introduction. In: Beyond Foucault: New Perspectives on Bentham\u2019s Panopticon. Ashgate Publishing, Ltd. (2012)"},{"key":"14_CR34","unstructured":"SparkNotes Editors: Sparknote on discipline and punish. SparkNotes LLC (nd). http:\/\/www.sparknotes.com\/philosophy\/disciplinepunish\/"},{"key":"14_CR35","unstructured":"Carr, N.: Tracking is an assault on liberty, with real dangers. Wall Street J. 7 (2010). https:\/\/www.wsj.com\/articles\/SB10001424052748703748904575411682714389888"},{"key":"14_CR36","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/MTAS.2003.1188276","volume":"22","author":"JE Dobson","year":"2003","unstructured":"Dobson, J.E., Fisher, P.F.: Geoslavery. IEEE Technol. Soc. Mag. 22, 47\u201352 (2003)","journal-title":"IEEE Technol. Soc. Mag."},{"key":"14_CR37","unstructured":"Orwell, G.: Nineteen eighty-four. eBook No 0100021, Project Gutenberg of Australia (1949). http:\/\/gutenberg.net.au\/ebooks01\/0100021.txt"},{"key":"14_CR38","unstructured":"Schmitz, P.M.U., Cooper, A.K.: Using cellular telephones to track participants\u2019 movements to and from an event. In: South African Transportation Conference (SATC), Pretoria, 11\u201314 July 2011"},{"key":"14_CR39","unstructured":"Vincent, D.: Surveillance, privacy and history. History and Policy. http:\/\/www.historyandpolicy.org\/papers\/policy-paper-151.htm. Accessed Oct 2013"},{"key":"14_CR40","unstructured":"Lanier, J.: Digital Passivity. The New York Times, 27 November 2013"},{"issue":"4","key":"14_CR41","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1086\/448181","volume":"8","author":"M Foucault","year":"1982","unstructured":"Foucault, M.: The subject and power. Crit. Inq. 8(4), 777\u2013795 (1982)","journal-title":"Crit. Inq."},{"key":"14_CR42","doi-asserted-by":"publisher","unstructured":"Stirling, P., Chevallier, P. and Illien, G.: Web archives for researchers: representations, expectations and potential uses. D-Lib, 18(3\/4) (2012). https:\/\/doi.org\/10.1045\/march2012-stirling","DOI":"10.1045\/march2012-stirling"},{"key":"14_CR43","unstructured":"Court of Justice of the European Union: Judgement of the Court (Grand Chamber) in Case C-131\/12, Google Spain SL, Google Inc v Agencia Espa\u00f1ola de Protecci\u00f3n de Datos (AEPD), Mario Costeja Gonz\u00e1lez. InfoCuria, 13 May 2014"},{"key":"14_CR44","unstructured":"Court of Justice of the European Union: Advocate General\u2019s Opinion in Case C-131\/12, Google Spain SL, Google Inc. v Agencia Espa\u00f1ola de Protecci\u00f3n de Datos, Mario Costeja Gonz\u00e1lez. PRESS RELEASE No 77\/13. InfoCuria, 25 June 2013"},{"key":"14_CR45","unstructured":"Lane, E.: Google removes 12 BBC News links in \u2018right to be forgotten\u2019. BBC News: Technology, 19 August 2014. http:\/\/www.bbc.com\/news\/technology-28851366"},{"key":"14_CR46","unstructured":"Peston, R.: Why has Google cast me into oblivion? BBC News: Business. http:\/\/www.bbc.com\/news\/business-28130581. 2 July 2014"},{"key":"14_CR47","unstructured":"Scott, M.: Google reinstates some links in Europe. The New York Times, 4 July 2014"},{"key":"14_CR48","unstructured":"Zittrain, J.: Is the EU compelling Google to become about me? The Future of the Internet. http:\/\/blogs.law.harvard.edu\/futureoftheinternet\/2014\/05\/13\/is-the-eu-compelling-google-to-become-about-me\/. Accessed 13 May 2014"},{"issue":"9","key":"14_CR49","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/2500468.2500474","volume":"56","author":"E Shein","year":"2013","unstructured":"Shein, E.: Ephemeral data. Commun. ACM 56(9), 20\u201322 (2013)","journal-title":"Commun. ACM"},{"key":"14_CR50","unstructured":"US Court of Appeals for the Ninth Circuit: Perfect 10, Inc v Amazon.com, Inc and A9.com Inc and Google Inc. Case F.3d, US Court of Appeals for the Ninth Circuit (2007)"},{"key":"14_CR51","unstructured":"Alexander, R.: Are search engine result figures accurate? BBC News Magazine. http:\/\/www.bbc.co.uk\/news\/magazine-17068044. Accessed 20 Feb 2012"},{"key":"14_CR52","unstructured":"Cooper, A.K., Byleveld, P., Schmitz, P.M.U.: Using GIS to reconcile crime scenes with those indicated by serial criminals. In: 5th Annual International Crime Mapping Research Conference, Dallas, Texas, USA, 1\u20134 Dec 2001"},{"key":"14_CR53","unstructured":"Schmitz, P.M.U., Cooper, A.K., Byleveld, P., Rossmo, D.K.: Using GIS and digital aerial photography to assist in the conviction of a serial killer. In: 4th Annual International Crime Mapping Research Conference, San Diego, California, USA, 9\u201312 December 2000"},{"key":"14_CR54","unstructured":"Gutmann, M.P., Stern, P.C. (eds.): Putting People on the Map: Protecting Confidentiality with Linked Social-Spatial Data. National Academies Press (2007). ISBN 978-0-309-10414-2"},{"key":"14_CR55","doi-asserted-by":"crossref","unstructured":"De Montjoye, Y.-A., Hidalgo, C.A., Verleysen, M., Blondel, V.D.: Unique in the crowd: the privacy bounds of human mobility. Sci. Rep. 3(1376), 1\u20135 (2013)","DOI":"10.1038\/srep01376"},{"key":"14_CR56","unstructured":"Michalevsky, Y., Boneh, D., Schulman, A., Nakibly, G.: PowerSpy: location tracking using mobile device power analysis. arXiv:1502.03182v1 (2015)"},{"key":"14_CR57","unstructured":"Siddle, J.: I know where you were last summer: London\u2019s public bike data is telling everyone where you\u2019ve been. The Variable Tree. http:\/\/vartree.blogspot.co.uk\/2014\/04\/i-know-where-you-were-last-summer. 10 Apr 2014"},{"key":"14_CR58","doi-asserted-by":"publisher","unstructured":"Zhou, M.X., Wang, F., Zimmerman, T., Yang, H., Haber, E., Gou, L.: Computational discovery of personal traits from social multimedia. In: 2013 IEEE International Conference on Multimedia and Expo Workshops (ICMEW), San Jose, CA, 15\u201319 July 2013, pp. 1\u20136 (2013). https:\/\/doi.org\/10.1109\/icmew.2013.6618398","DOI":"10.1109\/icmew.2013.6618398"},{"key":"14_CR59","unstructured":"Timberg, C.: For sale: systems that can secretly track where cellphone users go around the globe. Wash. Post (2014)"},{"key":"14_CR60","unstructured":"Narayanan, A.: There is no such thing as anonymous online tracking. The Center for Internet and Society at Stanford Law School, 28 July 2011. http:\/\/cyberlaw.stanford.edu\/node\/6701"},{"key":"14_CR61","doi-asserted-by":"crossref","unstructured":"Nimmer, M.B.: The right of publicity. Law Contemp. Prob. 19(2), 203\u2013223 (1954)","DOI":"10.2307\/1190488"},{"key":"14_CR62","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-94-007-4587-2_3","volume-title":"Crowdsourcing Geographic Knowledge","author":"F Harvey","year":"2013","unstructured":"Harvey, F.: To volunteer or to contribute locational information? Towards truth in labeling for crowdsourced geographic information. In: Sui, D.Z., Elwood, S., Goodchild, M.F. (eds.) Crowdsourcing Geographic Knowledge, pp. 31\u201342. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-94-007-4587-2_3"},{"key":"14_CR63","unstructured":"Supreme Court of the United States: Ohio v Matthew Reiner, No. 532, U.S., 19 March 2001"},{"key":"14_CR64","unstructured":"Solove, D.J.: \u2018I\u2019ve got nothing to hide\u2019 and other misunderstandings of privacy. San Diego Law Rev. 44 (2007). http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=998565"},{"key":"14_CR65","unstructured":"Big Brother Watch: Briefing note: Why communications data (metadata) matter. What are communications data? Big BrotherWatch, London, United Kingdom, July 2014. https:\/\/www.bigbrotherwatch.org.uk\/wp-content\/uploads\/2014\/07\/Communications-Data-Briefing.pdf"},{"key":"14_CR66","unstructured":"Collins, K.: You have more to hide in your data trail than you think. Wired UK, 19 August 2014"},{"key":"14_CR67","unstructured":"Phillipson, G.: Q&A: the right to privacy. BBC Religion & Ethics, 14 June 2013"},{"key":"14_CR68","unstructured":"Cooper, A.K.: An exposition of the nature of volunteered geographical information and its suitability for integration into spatial data infrastructures. PhD thesis, University of Pretoria, South Africa, July 2016. http:\/\/hdl.handle.net\/2263\/57515"}],"container-title":["Lecture Notes in Computer Science","Responsible Design, Implementation and Use of Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-45002-1_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,5]],"date-time":"2024-04-05T23:08:16Z","timestamp":1712358496000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-45002-1_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030450014","9783030450021"],"references-count":68,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-45002-1_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"I3E","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Conference on e-Business, e-Services and e-Society","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Skukuza","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"South Africa","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 April 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 April 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"i3e2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.i3e2020.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"191","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"80","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the global COVID-19 pandemic and the consequential worldwide imposed travel restrictions and lockdown, the I3E 2020 conference was cancelled.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}