{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T09:45:26Z","timestamp":1766137526665,"version":"3.40.3"},"publisher-location":"Cham","reference-count":58,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030603465"},{"type":"electronic","value":"9783030603472"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-60347-2_12","type":"book-chapter","created":{"date-parts":[[2020,9,24]],"date-time":"2020-09-24T06:02:54Z","timestamp":1600927374000},"page":"183-195","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["The Oxymoron of the Internet Voting in Illiberal and Hybrid Political Contexts"],"prefix":"10.1007","author":[{"given":"Bogdan","family":"Romanov","sequence":"first","affiliation":[]},{"given":"Yury","family":"Kabanov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,25]]},"reference":[{"key":"12_CR1","doi-asserted-by":"publisher","DOI":"10.1177\/0010414020912278","author":"E Keremo\u011flu","year":"2020","unstructured":"Keremo\u011flu, E., Weidmann, N.B.: How dictators control the internet: a review essay. Comp. Polit. Stud. (2020). https:\/\/doi.org\/10.1177\/0010414020912278","journal-title":"Comp. Polit. Stud."},{"issue":"3","key":"12_CR2","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1177\/0022343314555782","volume":"52","author":"EG R\u00f8d","year":"2015","unstructured":"R\u00f8d, E.G., Weidmann, N.B.: Empowering activists or autocrats? The Internet in authoritarian regimes. J. Peace Res. 52(3), 338\u2013351 (2015)","journal-title":"J. Peace Res."},{"issue":"3","key":"12_CR3","first-page":"179","volume":"6","author":"M Karlsson","year":"2013","unstructured":"Karlsson, M.: Carrots and sticks: internet governance in non\u2013democratic regimes. Int. J. Electron. Gov. 6(3), 179\u2013186 (2013)","journal-title":"Int. J. Electron. Gov."},{"issue":"3","key":"12_CR4","doi-asserted-by":"publisher","first-page":"956","DOI":"10.1177\/1461444816675444","volume":"20","author":"F Toepfl","year":"2018","unstructured":"Toepfl, F.: Innovating consultative authoritarianism: internet votes as a novel digital tool to stabilize non-democratic rule in Russia. New Media Soc. 20(3), 956\u2013972 (2018)","journal-title":"New Media Soc."},{"issue":"3","key":"12_CR5","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1016\/j.giq.2019.04.004","volume":"36","author":"B Christensen","year":"2019","unstructured":"Christensen, B.: Cyber state capacity: a model of authoritarian durability, ICTs, and emerging media. Govern. Inf. Q. 36(3), 460\u2013468 (2019)","journal-title":"Govern. Inf. Q."},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Krimmer, R., Duenas-Cid, D., Krivonosova, I.: Debate: safeguarding democracy during pandemics. Social distancing, postal, or internet voting\u2014the good, the bad or the ugly? Public Money Manage. 1\u20133 (2020)","DOI":"10.1080\/09540962.2020.1766222"},{"key":"12_CR7","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-319-27419-5_4","volume-title":"Electronic Democracy in Europe","author":"K Goos","year":"2016","unstructured":"Goos, K., Beckert, B., Lindner, R.: Electronic, internet-based voting. In: Lindner, R., Aichholzer, G., Hennen, L. (eds.) Electronic Democracy in Europe, pp. 135\u2013184. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-27419-5_4"},{"key":"12_CR8","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/978-3-030-06234-7_39","volume-title":"The Art of Structuring","author":"R Krimmer","year":"2019","unstructured":"Krimmer, R.: A structure for new voting technologies: what they are, how they are used and why. In: Bergener, K., R\u00e4ckers, M., Stein, A. (eds.) The Art of Structuring, pp. 421\u2013426. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-06234-7_39"},{"issue":"3","key":"12_CR9","first-page":"1313","volume":"64","author":"J Berman","year":"1997","unstructured":"Berman, J., Weitzner, D.J.: Technology and democracy. Soc. Res. 64(3), 1313\u20131319 (1997)","journal-title":"Soc. Res."},{"key":"12_CR10","unstructured":"Calingaert, D.: Authoritarianism vs. the internet. Pol. Rev. 14 (2010)"},{"issue":"3","key":"12_CR11","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1353\/jod.0.0190","volume":"21","author":"L Diamond","year":"2010","unstructured":"Diamond, L.: Liberation technology. J. Democr. 21(3), 69\u201383 (2010). https:\/\/doi.org\/10.1353\/jod.0.0190","journal-title":"J. Democr."},{"key":"12_CR12","unstructured":"Grider, M.: Securing the vote: electronic voting in theory and practice. 9 (2018)"},{"issue":"3","key":"12_CR13","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1016\/j.giq.2016.06.007","volume":"33","author":"K Vassil","year":"2016","unstructured":"Vassil, K., Solvak, M., Vinkel, P., Trechsel, A.H., Alvarez, R.M.: The diffusion of internet voting. Usage patterns of internet voting in Estonia between 2005 and 2015. Gov. Inf. Q. 33(3), 453\u2013459 (2016). https:\/\/doi.org\/10.1016\/j.giq.2016.06.007","journal-title":"Gov. Inf. Q."},{"issue":"3","key":"12_CR14","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1111\/gove.12393","volume":"32","author":"Y Kornreich","year":"2019","unstructured":"Kornreich, Y.: Authoritarian responsiveness: Online consultation with \u201cissue publics\u201d in China. Governance 32(3), 547\u2013564 (2019). https:\/\/doi.org\/10.1111\/gove.12393","journal-title":"Governance"},{"issue":"3","key":"12_CR15","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1177\/0010414014534196","volume":"50","author":"R Truex","year":"2017","unstructured":"Truex, R.: Consultative authoritarianism and its limits. Comp. Polit. Stud. 50(3), 329\u2013361 (2017). https:\/\/doi.org\/10.1177\/0010414014534196","journal-title":"Comp. Polit. Stud."},{"issue":"2","key":"12_CR16","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1353\/jod.2011.0033","volume":"22","author":"R MacKinnon","year":"2011","unstructured":"MacKinnon, R.: Liberation technology: China\u2019s \u201cnetworked authoritarianism\u201d. J. Democr. 22(2), 32\u201346 (2011)","journal-title":"J. Democr."},{"issue":"3","key":"12_CR17","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1177\/0894439305275850","volume":"23","author":"PS Herrnson","year":"2005","unstructured":"Herrnson, P.S., et al.: Early appraisals of electronic voting. Soc. Sci. Comput. Rev. 23(3), 274\u2013292 (2005). https:\/\/doi.org\/10.1177\/0894439305275850","journal-title":"Soc. Sci. Comput. Rev."},{"issue":"4","key":"12_CR18","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1109\/MS.2018.2801546","volume":"35","author":"N Kshetri","year":"2018","unstructured":"Kshetri, N., Voas, J.: Blockchain-enabled e-voting. IEEE Softw. 35(4), 95\u201399 (2018). https:\/\/doi.org\/10.1109\/MS.2018.2801546","journal-title":"IEEE Softw."},{"issue":"8","key":"12_CR19","doi-asserted-by":"publisher","first-page":"1397","DOI":"10.1080\/13510347.2018.1470165","volume":"25","author":"N Cheeseman","year":"2018","unstructured":"Cheeseman, N., Lynch, G., Willis, J.: Digital dilemmas: the unintended consequences of election technology. Democratization 25(8), 1397\u20131418 (2018)","journal-title":"Democratization"},{"key":"12_CR20","unstructured":"Oostveen, A.M., van den Besselaar, P.: The academic debate on electronic voting in a socio-political context. In: E-Vote-ID 2019. 17 (2019)"},{"key":"12_CR21","unstructured":"Binte Haq, H., McDermott, R., Taha Ali, S.: Pakistan\u2019s internet voting experiment. arXiv:1907.07765 (2019)"},{"key":"12_CR22","unstructured":"Al Siyabi, M., Al Jabri, N., Al-Shihi, H., Al-Khod, A. K.: The uptake of voting participations in oman through e-voting. In: The International Information Systems Conference (iiSC) 2011 Sultan Qaboos University, Muscat, Sultanate of Oman (2011)"},{"issue":"6","key":"12_CR23","first-page":"25","volume":"2","author":"AM Al-Khouri","year":"2012","unstructured":"Al-Khouri, A.M., Authority, E.I., Dhabi, A.: E-voting in UAE FNC elections: a case study. Inf. Knowl. Manage. 2(6), 25\u201384 (2012)","journal-title":"Inf. Knowl. Manage."},{"key":"12_CR24","first-page":"305","volume":"14","author":"M Kassen","year":"2020","unstructured":"Kassen, M.: Politicization of e-voting rejection: reflections from Kazakhstan. Transform. Gov. People Process Policy 14, 305\u2013330 (2020)","journal-title":"Transform. Gov. People Process Policy"},{"issue":"2","key":"12_CR25","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1353\/jod.2002.0031","volume":"13","author":"A Schedler","year":"2002","unstructured":"Schedler, A.: Elections without democracy: the menu of manipulation. J. Democr. 13(2), 36\u201350 (2002)","journal-title":"J. Democr."},{"key":"12_CR26","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199680320.001.0001","volume-title":"The Politics of Uncertainty: Sustaining and Subverting Electoral Authoritarianism","author":"A Schedler","year":"2013","unstructured":"Schedler, A.: The Politics of Uncertainty: Sustaining and Subverting Electoral Authoritarianism. OUP, Oxford (2013)"},{"issue":"4","key":"12_CR27","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1111\/1758-5899.12372","volume":"7","author":"M Kneuer","year":"2016","unstructured":"Kneuer, M., Harnisch, S.: Diffusion of e-government and e-participation in Democracies and Autocracies. Global Policy 7(4), 548\u2013556 (2016)","journal-title":"Global Policy"},{"issue":"3","key":"12_CR28","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1080\/13569775.2017.1304320","volume":"23","author":"A Dukalskis","year":"2017","unstructured":"Dukalskis, A., Gerschewski, J.: What autocracies say (and what citizens hear): proposing four mechanisms of autocratic legitimation. Contemp. Polit. 23(3), 251\u2013268 (2017)","journal-title":"Contemp. Polit."},{"issue":"1","key":"12_CR29","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1080\/13510347.2013.738860","volume":"20","author":"J Gerschewski","year":"2013","unstructured":"Gerschewski, J.: The three pillars of stability: legitimation, repression, and co-optation in autocratic regimes. Democratization 20(1), 13\u201338 (2013)","journal-title":"Democratization"},{"issue":"3","key":"12_CR30","doi-asserted-by":"publisher","first-page":"652","DOI":"10.1017\/S1537592717002183","volume":"16","author":"J Gerschewski","year":"2018","unstructured":"Gerschewski, J.: Legitimacy in autocracies: oxymoron or essential feature? Perspect. Polit. 16(3), 652\u2013665 (2018)","journal-title":"Perspect. Polit."},{"issue":"3","key":"12_CR31","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1080\/13569775.2017.1304319","volume":"23","author":"C von Soest","year":"2017","unstructured":"von Soest, C., Grauvogel, J.: Identity, procedures and performance: how authoritarian regimes legitimize their rule. Contemp. Polit. 23(3), 287\u2013305 (2017)","journal-title":"Contemp. Polit."},{"key":"12_CR32","doi-asserted-by":"crossref","unstructured":"Tannenberg, M., Bernhard, M., Gerschewski, J., L\u00fchrmann, A., Von Soest, C.: Regime Legitimation Strategies (RLS) 1900 to 2018. V-Dem Working Paper. 86 (2019)","DOI":"10.2139\/ssrn.3378017"},{"issue":"1","key":"12_CR33","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1080\/13569775.2013.773200","volume":"19","author":"M Wahman","year":"2013","unstructured":"Wahman, M., Teorell, J., Hadenius, A.: Authoritarian regime types revisited: updated data in comparative perspective. Contemp. Polit. 19(1), 19\u201334 (2013)","journal-title":"Contemp. Polit."},{"key":"12_CR34","unstructured":"Bader, M.: Do new voting technologies prevent fraud? Evidence from Russia. In: 2014 Electronic Voting Technology Workshop\/Workshop on Trustworthy Elections (EVT\/WOTE 2014) (2014)"},{"key":"12_CR35","volume-title":"Computers and Politics: High Technology in American Local Governments","author":"WH Dutton","year":"1982","unstructured":"Dutton, W.H., Danziger, J.N.: Computers and Politics: High Technology in American Local Governments. Columbia University Press, New York (1982)"},{"key":"12_CR36","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1146\/annurev-polisci-052013-115248","volume":"17","author":"D Brancati","year":"2014","unstructured":"Brancati, D.: Democratic authoritarianism: origins and effects. Annu. Rev. Polit. Sci. 17, 313\u2013326 (2014)","journal-title":"Annu. Rev. Polit. Sci."},{"key":"12_CR37","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1146\/annurev.polisci.11.060106.095434","volume":"12","author":"J Gandhi","year":"2009","unstructured":"Gandhi, J., Lust-Okar, E.: Elections under authoritarianism. Ann. Rev. Polit. Sci. 12, 403\u2013422 (2009)","journal-title":"Ann. Rev. Polit. Sci."},{"key":"12_CR38","unstructured":"Ananyev, M., Poyker, M.: Do Dictators Signal Strength with Elections? (2018). SSRN 2712064"},{"issue":"7\u20138","key":"12_CR39","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/s12243-016-0525-8","volume":"71","author":"JP Gibson","year":"2016","unstructured":"Gibson, J.P., Krimmer, R., Teague, V., Pomares, J.: A review of e-voting: the past, present and future. Ann. Telecommun. 71(7\u20138), 279\u2013286 (2016)","journal-title":"Ann. Telecommun."},{"key":"12_CR40","doi-asserted-by":"publisher","unstructured":"Goodman, N., Stokes, L. C.: Reducing the cost of voting: an evaluation of internet voting\u2019s effect on turnout. Br. J. Polit. Sci. 1\u201313 (2018). https:\/\/doi.org\/10.1017\/S0007123417000849","DOI":"10.1017\/S0007123417000849"},{"issue":"8","key":"12_CR41","doi-asserted-by":"publisher","first-page":"1336","DOI":"10.1177\/1461444811405807","volume":"13","author":"K Vassil","year":"2011","unstructured":"Vassil, K., Weber, T.: A bottleneck model of e-voting: why technology fails to boost turnout. New Media Soc. 13(8), 1336\u20131354 (2011)","journal-title":"New Media Soc."},{"issue":"1","key":"12_CR42","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1002\/poi3.160","volume":"10","author":"M Solvak","year":"2018","unstructured":"Solvak, M., Vassil, K.: Could internet voting halt declining electoral turnout? New evidence that e-voting is habit forming. Policy Internet 10(1), 4\u201321 (2018)","journal-title":"Policy Internet"},{"key":"12_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.electstud.2017.03.001","volume":"47","author":"M Germann","year":"2017","unstructured":"Germann, M., Serd\u00fclt, U.: Internet voting and turnout: evidence from Switzerland. Electoral. Stud. 47, 1\u201312 (2017)","journal-title":"Electoral. Stud."},{"key":"12_CR44","unstructured":"Reuter, O.J: Political Participation and the Survival of Electoral Authoritarian Regimes. http:\/\/ojreuter.com\/wp-content\/uploads\/Turnout_Paper.pdf"},{"key":"12_CR45","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1016\/j.electstud.2018.06.010","volume":"54","author":"E Frantz","year":"2018","unstructured":"Frantz, E.: Voter turnout and opposition performance in competitive authoritarian elections. Electoral. Stud. 54, 218\u2013225 (2018)","journal-title":"Electoral. Stud."},{"key":"12_CR46","doi-asserted-by":"publisher","unstructured":"Heiberg, S., Martens, T., Vinkel, P., Willemson, J.: Improving the verifiability of the Estonian Internet Voting scheme. In: Krimmer, R., et al. (eds.) Electronic Voting. International Joint Conference on Electronic Voting, pp. 92\u2013107. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-52240-1_6","DOI":"10.1007\/978-3-319-52240-1_6"},{"key":"12_CR47","doi-asserted-by":"crossref","unstructured":"Springall, D., et al.: Security analysis of the Estonian internet voting system. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 703\u2013715 (2014)","DOI":"10.1145\/2660267.2660315"},{"key":"12_CR48","unstructured":"Bull, C., Gj\u00f8steen, K., Nore, H.: Faults in Norwegian internet voting. In: E-Vote-ID 2018 Proceedings, pp. 166\u2013169 (2018)"},{"issue":"3","key":"12_CR49","first-page":"498","volume":"24","author":"K Ruijgrok","year":"2017","unstructured":"Ruijgrok, K.: From the web to the streets: internet and protests under authoritarian regimes. Democratization 24(3), 498\u2013520 (2017)","journal-title":"Democratization"},{"issue":"4","key":"12_CR50","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1080\/09668136.2011.566427","volume":"63","author":"GV Golosov","year":"2011","unstructured":"Golosov, G.V.: The regional roots of electoral authoritarianism in Russia. Europe-Asia Stud. 63(4), 623\u2013639 (2011)","journal-title":"Europe-Asia Stud."},{"issue":"1","key":"12_CR51","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1080\/09668136.2019.1682522","volume":"72","author":"M Turchenko","year":"2020","unstructured":"Turchenko, M.: Electoral engineering in the russian regions (2003\u20132017). Europe-Asia Stud. 72(1), 80\u201398 (2020)","journal-title":"Europe-Asia Stud."},{"issue":"1","key":"12_CR52","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1057\/s41599-017-0055-7","volume":"4","author":"C Ross","year":"2018","unstructured":"Ross, C.: Regional elections in Russia: instruments of authoritarian legitimacy or instability? Palgrave Commun. 4(1), 1\u20139 (2018)","journal-title":"Palgrave Commun."},{"issue":"1","key":"12_CR53","doi-asserted-by":"publisher","first-page":"29","DOI":"10.17645\/mac.v5i1.808","volume":"5","author":"N Mar\u00e9chal","year":"2017","unstructured":"Mar\u00e9chal, N.: Networked authoritarianism and the geopolitics of information: understanding Russian Internet policy. Media Commun. 5(1), 29\u201341 (2017)","journal-title":"Media Commun."},{"key":"12_CR54","doi-asserted-by":"publisher","first-page":"1","DOI":"10.14763\/2015.4.380","volume":"4","author":"J Nocetti","year":"2015","unstructured":"Nocetti, J.: Russia\u2019s\u2019 dictatorship-of-the-law\u2019 approach to internet policy. Internet Policy Rev. 4, 1\u201319 (2015)","journal-title":"Internet Policy Rev."},{"issue":"4","key":"12_CR55","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.giq.2016.08.008","volume":"33","author":"SF Maerz","year":"2016","unstructured":"Maerz, S.F.: The electronic face of authoritarianism: e-government as a tool for gaining legitimacy in competitive and non-competitive regimes. Gov. Inf. Q. 33(4), 727\u2013735 (2016)","journal-title":"Gov. Inf. Q."},{"key":"12_CR56","doi-asserted-by":"publisher","unstructured":"Chugunov, A.V., Kabanov, Y., Zenchenkova, K.: Russian e-petitions portal: exploring regional variance in use. In: Tambouris, E., et al. (eds.) Electronic Participation. International Conference on Electronic Participation, pp. 109\u2013122. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45074-2_9","DOI":"10.1007\/978-3-319-45074-2_9"},{"key":"12_CR57","doi-asserted-by":"publisher","unstructured":"Kabanov, Y., Chugunov, A. V.: Electronic \u201cpockets of effectiveness\u201d: e-governance and institutional change in St. Petersburg, Russia. In: Janssen, M., et al. (eds.) Electronic Government. International Conference on Electronic Government, pp. 386\u2013398. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-64677-0_32","DOI":"10.1007\/978-3-319-64677-0_32"},{"key":"12_CR58","doi-asserted-by":"publisher","unstructured":"Coppedge, M., et al.: V-Dem [Country\u2013Year\/Country\u2013Date] Dataset v10. Varieties of Democracy (V-Dem) Project (2020). https:\/\/doi.org\/10.23696\/vdemds20","DOI":"10.23696\/vdemds20"}],"container-title":["Lecture Notes in Computer Science","Electronic Voting"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-60347-2_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,18]],"date-time":"2022-02-18T19:27:51Z","timestamp":1645212471000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-60347-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030603465","9783030603472"],"references-count":58,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-60347-2_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"25 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"E-Vote-ID","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Joint Conference on Electronic Voting","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bregenz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"evoteid2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.e-vote-id.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"55","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}