{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:56:18Z","timestamp":1773154578314,"version":"3.50.1"},"publisher-location":"Cham","reference-count":56,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030544546","type":"print"},{"value":"9783030544553","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-54455-3_2","type":"book-chapter","created":{"date-parts":[[2020,8,6]],"date-time":"2020-08-06T12:07:37Z","timestamp":1596715657000},"page":"18-35","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["User-Centered Risk Communication for Safer Browsing"],"prefix":"10.1007","author":[{"given":"Sanchari","family":"Das","sequence":"first","affiliation":[]},{"given":"Jacob","family":"Abbott","sequence":"additional","affiliation":[]},{"given":"Shakthidhar","family":"Gopavaram","sequence":"additional","affiliation":[]},{"given":"Jim","family":"Blythe","sequence":"additional","affiliation":[]},{"given":"L. Jean","family":"Camp","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,7]]},"reference":[{"key":"2_CR1","unstructured":"97% of people globally unable to correctly identify phishing emails, May 2015. \nhttps:\/\/www.businesswire.com\/news\/home\/20150512005245\/en\/97-People-Globally-Unable-Correctly-Identify-Phishing"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Anderson, B.B., Kirwan, C.B., Jenkins, J.L., Eargle, D., Howard, S., Vance, A.: How polymorphic warnings reduce habituation in the brain: insights from an FMRI study. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp. 2883\u20132892. ACM (2015)","DOI":"10.1145\/2702123.2702322"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Arianezhad, M., Camp, L.J., Kelley, T., Stebila, D.: Comparative eye tracking of experts and novices in web single sign-on. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, pp. 105\u2013116. ACM (2013)","DOI":"10.1145\/2435349.2435362"},{"key":"2_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1007\/978-3-540-77366-5_34","volume-title":"Financial Cryptography and Data Security","author":"F Asgharpour","year":"2007","unstructured":"Asgharpour, F., Liu, D., Camp, L.J.: Mental models of security risks. In: Dietrich, S., Dhamija, R. (eds.) FC 2007. LNCS, vol. 4886, pp. 367\u2013377. Springer, Heidelberg (2007). \nhttps:\/\/doi.org\/10.1007\/978-3-540-77366-5_34"},{"key":"2_CR5","unstructured":"Assal, H., Chiasson, S.: Will this onion make you cry? A usability study of tor-enabled mobile apps. In: Poster presented at the 10th Symposium on Usable Privacy and Security (SOUPS) (2014)"},{"key":"2_CR6","unstructured":"Bartsch, S., Volkamer, M., Cased, T.: Effectively communicate risks for diverse users: a mental-models approach for individualized security interventions. In: GI-Jahrestagung, pp. 1971\u20131984 (2013)"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Benton, K., Camp, L.J., Garg, V.: Studying the effectiveness of android application permissions requests. In: 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 291\u2013296. IEEE (2013)","DOI":"10.1109\/PerComW.2013.6529497"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Blythe, J., Camp, L.J.: Implementing mental models. In: 2012 IEEE Symposium on Security and Privacy Workshops (SPW), pp. 86\u201390. IEEE (2012)","DOI":"10.1109\/SPW.2012.31"},{"key":"2_CR9","first-page":"18","volume":"2","author":"C Bravo-Lillo","year":"2010","unstructured":"Bravo-Lillo, C., Cranor, L.F., Downs, J., Komanduri, S.: Bridging the gap in computer security warnings: a mental model approach. IEEE Secur. Priv. 2, 18\u201326 (2010)","journal-title":"IEEE Secur. Priv."},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Camp, L.J.: Mental models of privacy and security. Available at SSRN 922735 (2006)","DOI":"10.2139\/ssrn.922735"},{"key":"2_CR11","unstructured":"CoreStreet: Spoofstick (2004). \nhttp:\/\/www.corestreet.com\/spoofstick\/"},{"key":"2_CR12","volume-title":"Security and Usability: Designing Secure Systems that People can Use","author":"LF Cranor","year":"2005","unstructured":"Cranor, L.F., Garfinkel, S.: Security and Usability: Designing Secure Systems that People can Use. O\u2019Reilly Media, Inc., Sebastopol (2005)"},{"key":"2_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/978-3-662-58387-6_9","volume-title":"Financial Cryptography and Data Security","author":"S Das","year":"2018","unstructured":"Das, S., Dingman, A., Camp, L.J.: Why Johnny doesn\u2019t use two factor a two-phase usability study of the FIDO U2F security key. In: Meiklejohn, S., Sako, K. (eds.) FC 2018. LNCS, vol. 10957, pp. 160\u2013179. Springer, Heidelberg (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-662-58387-6_9"},{"key":"2_CR14","unstructured":"Das, S., Kim, A., Tingle, Z., Nippert-Eng, C.: All about phishing: exploring user research through a systematic literature review. arXiv preprint \narXiv:1908.05897\n\n (2019)"},{"key":"2_CR15","unstructured":"Das, S., Kim, D., Kelley, T., Camp, L.J.: Grifting in the digital age (2018)"},{"key":"2_CR16","unstructured":"Das, S., Wang, B., Camp, L.J.: MFA is a waste of time! understanding negative connotation towards MFA applications via user generated content. In: Proceedings of the Thriteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019) (2019)"},{"key":"2_CR17","unstructured":"Das, S., Wang, B., Tingle, Z., Camp, L.J.: Evaluating user perception of multi-factor authentication: a systematic review. arXiv preprint \narXiv:1908.05901\n\n (2019)"},{"issue":"2","key":"2_CR18","first-page":"5","volume":"19","author":"Z Dong","year":"2016","unstructured":"Dong, Z., Kane, K., Camp, L.J.: Detection of rogue certificates from trusted certificate authorities using deep neural networks. ACM Trans. Priv. Secur. (TOPS) 19(2), 5 (2016)","journal-title":"ACM Trans. Priv. Secur. (TOPS)"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Dong, Z., Kapadia, A., Blythe, J., Camp, L.J.: Beyond the lock icon: real-time detection of phishing websites using public key certificates. In: 2015 APWG Symposium on Electronic Crime Research (eCrime), pp. 1\u201312. IEEE (2015)","DOI":"10.1109\/ECRIME.2015.7120795"},{"key":"2_CR20","unstructured":"Fagan, M., Khan, M.M.H.: Why do they do what they do?: A study of what motivates users to (not) follow computer security advice. In: Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), pp. 59\u201375 (2016)"},{"issue":"1","key":"2_CR21","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s10796-010-9265-x","volume":"15","author":"F Farahmand","year":"2013","unstructured":"Farahmand, F., Spafford, E.H.: Understanding insiders: an analysis of risk-taking behavior. Inf. Syst. Front. 15(1), 5\u201315 (2013). \nhttps:\/\/doi.org\/10.1007\/s10796-010-9265-x","journal-title":"Inf. Syst. Front."},{"key":"2_CR22","unstructured":"Felt, A.P., et al.: Rethinking connection security indicators. In: SOUPS, pp. 1\u201314 (2016)"},{"issue":"2","key":"2_CR23","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/BF00143739","volume":"9","author":"B Fischhoff","year":"1978","unstructured":"Fischhoff, B., Slovic, P., Lichtenstein, S., Read, S., Combs, B.: How safe is safe enough? A psychometric study of attitudes towards technological risks and benefits. Policy Sci. 9(2), 127\u2013152 (1978). \nhttps:\/\/doi.org\/10.1007\/BF00143739","journal-title":"Policy Sci."},{"issue":"6","key":"2_CR24","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1111\/j.1539-6924.1994.tb00082.x","volume":"14","author":"J Flynn","year":"1994","unstructured":"Flynn, J., Slovic, P., Mertz, C.K.: Gender, race, and perception of environmental health risks. Risk Anal. 14(6), 1101\u20131108 (1994)","journal-title":"Risk Anal."},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Garg, V., Camp, J.: End user perception of online risk under uncertainty. In: 2012 45th Hawaii International Conference on System Science (HICSS), pp. 3278\u20133287. IEEE (2012)","DOI":"10.1109\/HICSS.2012.245"},{"key":"2_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/978-3-642-31680-7_15","volume-title":"Privacy Enhancing Technologies","author":"V Garg","year":"2012","unstructured":"Garg, V., Camp, L.J., Connelly, K., Lorenzen-Huber, L.: Risk communication design: video vs. text. In: Fischer-H\u00fcbner, S., Wright, M. (eds.) PETS 2012. LNCS, vol. 7384, pp. 279\u2013298. Springer, Heidelberg (2012). \nhttps:\/\/doi.org\/10.1007\/978-3-642-31680-7_15"},{"key":"2_CR27","unstructured":"Herzberg, A., Gbara, A.: Trustbar: protecting (Even Naive) web users from spoofing and phishing attacks. Technical report, Cryptology ePrint Archive, Report 2004\/155 (2004). \nhttp:\/\/eprint.iacr.org\/2004\/155"},{"issue":"4","key":"2_CR28","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1111\/j.1539-6924.1995.tb00341.x","volume":"15","author":"BB Johnson","year":"1995","unstructured":"Johnson, B.B., Slovic, P.: Presenting uncertainty in health risk assessment: initial studies of its effects on risk perception and trust. Risk Anal. 15(4), 485\u2013494 (1995)","journal-title":"Risk Anal."},{"key":"2_CR29","doi-asserted-by":"publisher","first-page":"466","DOI":"10.3389\/fpsyg.2018.00466","volume":"9","author":"T Kelley","year":"2018","unstructured":"Kelley, T., Amon, M.J., Bertenthal, B.I.: Statistical models for predicting threat detection from human behavior. Front. Psychol. 9, 466 (2018)","journal-title":"Front. Psychol."},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"Likarish, P., Dunbar, D.E., Hourcade, J.P., Jung, E.: Bayeshield: conversational anti-phishing user interface. In: SOUPS, vol. 9, p. 1 (2009)","DOI":"10.1145\/1572532.1572565"},{"key":"2_CR31","doi-asserted-by":"crossref","unstructured":"Lin, J., Amini, S., Hong, J.I., Sadeh, N., Lindqvist, J., Zhang, J.: Expectation and purpose: understanding users\u2019 mental models of mobile app privacy through crowdsourcing. In: Proceedings of the 2012 ACM Conference on Ubiquitous Computing, pp. 501\u2013510. ACM (2012)","DOI":"10.1145\/2370216.2370290"},{"key":"2_CR32","unstructured":"Marchal, S., Asokan, N.: On designing and evaluating phishing webpage detection techniques for the real world. In: 11th USENIX Workshop on Cyber Security Experimentation and Test (CSET 2018). USENIX Association (2018)"},{"key":"2_CR33","doi-asserted-by":"crossref","unstructured":"Marforio, C., Jayaram Masti, R., Soriente, C., Kostiainen, K., \u010capkun, S.: Evaluation of personalized security indicators as an anti-phishing mechanism for smartphone applications. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pp. 540\u2013551. ACM (2016)","DOI":"10.1145\/2858036.2858085"},{"key":"2_CR34","doi-asserted-by":"crossref","unstructured":"Maurer, M.E., Herzner, D.: Using visual website similarity for phishing detection and reporting. In: CHI 2012 Extended Abstracts on Human Factors in Computing Systems, pp. 1625\u20131630. ACM (2012)","DOI":"10.1145\/2212776.2223683"},{"key":"2_CR35","unstructured":"McCune, J.M., Perrig, A., Reiter, M.K.: Bump in the ether: a framework for securing sensitive user input. In: Proceedings of the Annual Conference on USENIX 2006 Annual Technical Conference, p. 17. USENIX Association (2006)"},{"key":"2_CR36","unstructured":"Moore, T., Clayton, R.: The impact of public information on phishing attack and defense (2011)"},{"key":"2_CR37","unstructured":"Netcraft: Netcraft toolbar (2004). \nhttp:\/\/toolbar.netcraft.com\/"},{"key":"2_CR38","doi-asserted-by":"crossref","unstructured":"Patil, S., Hoyle, R., Schlegel, R., Kapadia, A., Lee, A.J.: Interrupt now or inform later?: comparing immediate and delayed privacy feedback. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp. 1415\u20131418. ACM (2015)","DOI":"10.1145\/2702123.2702165"},{"key":"2_CR39","doi-asserted-by":"crossref","unstructured":"Patrick, A.: Ecological validity in studies of security and human behaviour. In: SOUPS (2009)","DOI":"10.1145\/1572532.1572592"},{"key":"2_CR40","doi-asserted-by":"crossref","unstructured":"Raja, F., Hawkey, K., Hsu, S., Wang, K.L., Beznosov, K.: Promoting a physical security mental model for personal firewall warnings. In: CHI 2011 Extended Abstracts on Human Factors in Computing Systems, pp. 1585\u20131590. ACM (2011)","DOI":"10.1145\/1979742.1979812"},{"issue":"2","key":"2_CR41","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1108\/ICS-04-2017-0020","volume":"25","author":"P Rajivan","year":"2017","unstructured":"Rajivan, P., Moriano, P., Kelley, T., Camp, L.J.: Factors in an end-usersecurity expertise instrument. Inf. Comput. Secur. 25(2), 190\u2013205 (2017)","journal-title":"Inf. Comput. Secur."},{"issue":"2","key":"2_CR42","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1111\/j.0272-4332.2004.00433.x","volume":"24","author":"P Slovic","year":"2004","unstructured":"Slovic, P., Finucane, M.L., Peters, E., MacGregor, D.G.: Risk as analysis and risk as feelings: some thoughts about affect, reason, risk, and rationality. Risk Anal. 24(2), 311\u2013322 (2004)","journal-title":"Risk Anal."},{"issue":"2","key":"2_CR43","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.cose.2004.07.001","volume":"24","author":"JM Stanton","year":"2005","unstructured":"Stanton, J.M., Stam, K.R., Mastrangelo, P., Jolton, J.: Analysis of end user security behaviors. Comput. Secur. 24(2), 124\u2013133 (2005)","journal-title":"Comput. Secur."},{"issue":"2","key":"2_CR44","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1287\/isre.1090.0260","volume":"22","author":"JY Tsai","year":"2011","unstructured":"Tsai, J.Y., Egelman, S., Cranor, L., Acquisti, A.: The effect of online privacy information on purchasing behavior: an experimental study. Inf. Syst. Res. 22(2), 254\u2013268 (2011)","journal-title":"Inf. Syst. Res."},{"key":"2_CR45","first-page":"5","volume":"3","author":"A Tsow","year":"2007","unstructured":"Tsow, A., Viecco, C., Camp, L.J.: Privacy-aware architecture for sharing web histories. IBM Syst. J. 3, 5\u201313 (2007)","journal-title":"IBM Syst. J."},{"key":"2_CR46","doi-asserted-by":"crossref","unstructured":"Vance, A., Kirwan, B., Bjorn, D., Jenkins, J., Anderson, B.B.: What do we really know about how habituation to warnings occurs over time?: A longitudinal FMRI study of habituation and polymorphic warnings. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 2215\u20132227. ACM (2017)","DOI":"10.1145\/3025453.3025896"},{"key":"2_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/978-3-642-42001-6_18","volume-title":"Number Theory and Cryptography","author":"M Volkamer","year":"2013","unstructured":"Volkamer, M., Renaud, K.: Mental Models \u2013 general introduction and review of their application to human-centred security. In: Fischlin, M., Katzenbeisser, S. (eds.) Number Theory and Cryptography. LNCS, vol. 8260, pp. 255\u2013280. Springer, Heidelberg (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-42001-6_18"},{"key":"2_CR48","doi-asserted-by":"crossref","unstructured":"Wash, R.: Folk models of home computer security. In: Proceedings of the Sixth Symposium on Usable Privacy and Security, p. 11. ACM (2010)","DOI":"10.1145\/1837110.1837125"},{"key":"2_CR49","unstructured":"Weinberger, J., Felt, A.P.: A week to remember: the impact of browser warning storage policies. In: Symposium on Usable Privacy and Security (2016)"},{"issue":"6","key":"2_CR50","doi-asserted-by":"publisher","first-page":"2799","DOI":"10.1016\/j.chb.2008.04.005","volume":"24","author":"M Workman","year":"2008","unstructured":"Workman, M., Bommer, W.H., Straub, D.: Security lapses and the omission of information security measures: a threat control model and empirical test. Comput. Hum. Behav. 24(6), 2799\u20132816 (2008)","journal-title":"Comput. Hum. Behav."},{"key":"2_CR51","doi-asserted-by":"crossref","unstructured":"Wu, M., Miller, R.C., Garfinkel, S.L.: Do security toolbars actually prevent phishing attacks? In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 601\u2013610. ACM (2006)","DOI":"10.1145\/1124772.1124863"},{"key":"2_CR52","unstructured":"Yakowicz, W.: The 3 biggest phishing scams of 2018, July 2018. \nhttps:\/\/www.inc.com\/will-yakowicz\/biggest-email-phishing-scams-2018.html"},{"key":"2_CR53","unstructured":"Yee, K.P.: Designing and evaluating a petname anti-phishing tool. In: Poster presented at Symposium on usable Privacy and Security (SOUPS), pp. 6\u20138. Citeseer (2005)"},{"key":"2_CR54","unstructured":"Zhang-Kennedy, L., Chiasson, S.: Using comics to teach users about mobile online privacy. Technical report, Technical Report TR-14-02, School of Computer Science, Carleton University, Ottawa, Canada (2014)"},{"key":"2_CR55","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/978-3-319-07127-5_27","volume-title":"Persuasive Technology","author":"L Zhang-Kennedy","year":"2014","unstructured":"Zhang-Kennedy, L., Chiasson, S., Biddle, R.: Stop clicking on \u201cUpdate Later\u201d: persuading users they need up-to-date antivirus protection. In: Spagnolli, A., Chittaro, L., Gamberini, L. (eds.) PERSUASIVE 2014. LNCS, vol. 8462, pp. 302\u2013322. Springer, Cham (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-319-07127-5_27"},{"key":"2_CR56","doi-asserted-by":"crossref","unstructured":"Zurko, M.E., Simon, R.T.: User-centered security. In: Proceedings of the 1996 Workshop on New Security Paradigms, pp. 27\u201333. ACM (1996)","DOI":"10.1145\/304851.304859"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-54455-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,6]],"date-time":"2020-08-06T12:11:29Z","timestamp":1596715889000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-54455-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030544546","9783030544553"],"references-count":56,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-54455-3_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"7 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kota Kinabalu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 February 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 February 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc20.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"HotCRP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"162","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.6","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8.1","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}