{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T03:44:48Z","timestamp":1773287088029,"version":"3.50.1"},"publisher-location":"Cham","reference-count":58,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030633950","type":"print"},{"value":"9783030633967","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-63396-7_22","type":"book-chapter","created":{"date-parts":[[2020,11,20]],"date-time":"2020-11-20T15:11:27Z","timestamp":1605885087000},"page":"331-345","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["When Persuasive Technology Gets Dark?"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4326-2882","authenticated-orcid":false,"given":"Tobias","family":"Nystr\u00f6m","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2653-7677","authenticated-orcid":false,"given":"Agnis","family":"Stibe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,21]]},"reference":[{"key":"22_CR1","unstructured":"Aftonbladet: Barnens ipad spel kostade 50 000 kr (2011). www.aftonbladet.se\/nyheter\/article12846738.ab. Accessed 7 Feb 2018"},{"key":"22_CR2","unstructured":"Alexander, C.: A Pattern Language: Towns, Buildings, Construction. Oxford University Press, Oxford (1977)"},{"key":"22_CR3","unstructured":"Alha, K., Koskinen, E., Paavilainen, J., Hamari, J., Kinnunen, J.: Free-to-play games: professionals\u2019 perspectives. In: Proceedings of Nordic Digra 2014 (2014)"},{"key":"22_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-319-39583-8_17","volume-title":"Intelligent Tutoring Systems","author":"FRH Andrade","year":"2016","unstructured":"Andrade, F.R.H., Mizoguchi, R., Isotani, S.: The bright and dark sides of gamification. In: Micarelli, A., Stamper, J., Panourgia, K. (eds.) ITS 2016. LNCS, vol. 9684, pp. 176\u2013186. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-39583-8_17"},{"key":"22_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/11755494_25","volume-title":"Persuasive Technology","author":"BMC Atkinson","year":"2006","unstructured":"Atkinson, B.M.C.: Captology: a critical review. In: IJsselsteijn, W.A., de Kort, Y.A.W., Midden, C., Eggen, B., van den Hoven, E. (eds.) PERSUASIVE 2006. LNCS, vol. 3962, pp. 171\u2013182. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11755494_25"},{"issue":"5","key":"22_CR6","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/301353.301410","volume":"42","author":"D Berdichevsky","year":"1999","unstructured":"Berdichevsky, D., Neuenschwander, E.: Toward an ethics of persuasive technology. Commun. ACM 42(5), 51\u201358 (1999)","journal-title":"Commun. ACM"},{"issue":"8","key":"22_CR7","doi-asserted-by":"publisher","first-page":"e0159641","DOI":"10.1371\/journal.pone.0159641","volume":"11","author":"A Bessi","year":"2016","unstructured":"Bessi, A., et al.: Users polarization on Facebook and Youtube. PloS One 11(8), e0159641 (2016)","journal-title":"PloS One"},{"key":"22_CR8","volume-title":"Patterns in Game Design","author":"S Bj\u00f6rk","year":"2004","unstructured":"Bj\u00f6rk, S., Holopainen, J.: Patterns in Game Design. Charles River Media Inc., Rockland (2004)"},{"key":"22_CR9","unstructured":"Bogost, I.: Blog: Cow clicker - the making of obsession (2018). bogost.com\/blog\/cowclicker1\/. Accessed 10 Feb 2018"},{"issue":"4","key":"22_CR10","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/BF01206115","volume":"15","author":"JO Borchers","year":"2001","unstructured":"Borchers, J.O.: A pattern approach to interaction design. AI Soc. 15(4), 359\u2013376 (2001)","journal-title":"AI Soc."},{"key":"22_CR11","unstructured":"Brignull, H.: Darkpatterns.org (2018). darkpatterns.org. Accessed 9 Apr 2018"},{"key":"22_CR12","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1007\/978-3-319-10208-5_28","volume-title":"Gamification in Education and Business","author":"RC Callan","year":"2015","unstructured":"Callan, R.C., Bauer, K.N., Landers, R.N.: How to avoid the dark side of gamification: ten business scenarios and their unintended consequences. In: Reiners, T., Wood, L.C. (eds.) Gamification in Education and Business, pp. 553\u2013568. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-10208-5_28"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Deterding, S., Dixon, D., Khaled, R., Nacke, L.: From game design elements to gamefulness: Defining \u201cgamification\u201d. In: MindTrek 2011, pp. 9\u201315. ACM, New York (2011)","DOI":"10.1145\/2181037.2181040"},{"issue":"6","key":"22_CR14","first-page":"753","volume":"5","author":"MA DeVito","year":"2017","unstructured":"DeVito, M.A.: From editors to algorithms. Digit. J. 5(6), 753\u2013773 (2017)","journal-title":"Digit. J."},{"issue":"4","key":"22_CR15","doi-asserted-by":"publisher","first-page":"532","DOI":"10.5465\/amr.1989.4308385","volume":"14","author":"KM Eisenhardt","year":"1989","unstructured":"Eisenhardt, K.M.: Building theories from case study research. Acad. Manage. Rev. 14(4), 532\u2013550 (1989)","journal-title":"Acad. Manage. Rev."},{"issue":"6","key":"22_CR16","doi-asserted-by":"publisher","first-page":"967","DOI":"10.1093\/jcr\/ucv095","volume":"42","author":"J Etkin","year":"2016","unstructured":"Etkin, J.: The hidden cost of personal quantification. J. Cons. Res. 42(6), 967\u2013984 (2016)","journal-title":"J. Cons. Res."},{"issue":"2","key":"22_CR17","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.obhdp.2012.02.003","volume":"118","author":"A Fishbach","year":"2012","unstructured":"Fishbach, A., Choi, J.: When thinking about goals undermines goal pursuit. Organ. Behav. Hum. Decis. Process. 118(2), 99\u2013107 (2012)","journal-title":"Organ. Behav. Hum. Decis. Process."},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Fogg, B.: Persuasive computers: perspectives and research directions. In: CHI 1998, pp. 225\u2013232. ACM Press\/Addison-Wesley Publishing Co., New York (1998)","DOI":"10.1145\/274644.274677"},{"key":"22_CR19","doi-asserted-by":"crossref","unstructured":"Fogg, B.: Persuasive Technology: Using Computers to Change what We Think and Do. Morgan Kaufmann, Burlington (2003)","DOI":"10.1145\/764008.763957"},{"key":"22_CR20","unstructured":"Gamasutra: Zynga: the future, or just a bit of it? (2010). www.gamasutra.com\/blogs\/DavidHayward\/20100315\/4670\/Zynga_The_Future_Or_Just_A_Bit_Of_It.php. Accessed 12 Feb 2018"},{"key":"22_CR21","unstructured":"Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, Boston (1995)"},{"key":"22_CR22","unstructured":"Gram-Hansen, S.B.: Persuasive everyware-possibilities and limitations. In: 14th World Multi-Conference on Systemics, Cybernetics and Informatics: WMSCI 2010, pp. 254\u2013260. International Institute of Informatics and Systemics (2010)"},{"key":"22_CR23","doi-asserted-by":"crossref","unstructured":"Gray, C.M., Kou, Y., Battles, B., Hoggatt, J., Toombs, A.L.: The dark (patterns) side of UX design. In: CHI 2018, pp. 534:1\u2013534:14. ACM, New York (2018)","DOI":"10.1145\/3173574.3174108"},{"key":"22_CR24","unstructured":"Guerini, M., Pianesi, F., Stock, O.: Is it morally acceptable for a system to lie to persuade me? In: Artificial Intelligence and Ethics: Papers from the 2015 AAAI Workshop, vol. WS-15-02, pp. 53\u201360 (2015)"},{"key":"22_CR25","series-title":"Cognitive Technologies","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-319-21548-8_4","volume-title":"A Construction Manual for Robots\u2019 Ethical Systems","author":"J Ham","year":"2015","unstructured":"Ham, J., Spahn, A.: Shall i show you some other shirts too? The psychology and ethics of persuasive robots. In: Trappl, R. (ed.) A Construction Manual for Robots\u2019 Ethical Systems. CT, pp. 63\u201381. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-21548-8_4"},{"key":"22_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/978-3-319-07127-5_11","volume-title":"Persuasive Technology","author":"J Hamari","year":"2014","unstructured":"Hamari, J., Koivisto, J., Pakkanen, T.: Do persuasive technologies persuade? - A review of empirical studies. In: Spagnolli, A., Chittaro, L., Gamberini, L. (eds.) PERSUASIVE 2014. LNCS, vol. 8462, pp. 118\u2013136. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-07127-5_11"},{"key":"22_CR27","doi-asserted-by":"crossref","unstructured":"Huotari, K., Hamari, J.: Defining gamification: a service marketing perspective. In: MindTrek 2012, pp. 17\u201322. ACM, New York (2012)","DOI":"10.1145\/2393132.2393137"},{"key":"22_CR28","doi-asserted-by":"crossref","unstructured":"Hyrynsalmi, S., Smed, J., Kimppa, K.K.: The dark side of gamification: how we should stop worrying and study also the negative impacts of bringing game design elements to everywhere. In: Proceedings of the 1st International GamiFIN Conference, pp. 96\u2013104. CEUR Workshop Proceedings (2017)","DOI":"10.1007\/978-3-319-08234-9_138-1"},{"key":"22_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-642-13226-1_10","volume-title":"Persuasive Technology","author":"M Kaptein","year":"2010","unstructured":"Kaptein, M., Eckles, D.: Selecting effective means to any end: futures and ethics of persuasion profiling. In: Ploug, T., Hasle, P., Oinas-Kukkonen, H. (eds.) PERSUASIVE 2010. LNCS, vol. 6137, pp. 82\u201393. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13226-1_10"},{"issue":"2","key":"22_CR30","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/s10676-016-9401-5","volume":"18","author":"TW Kim","year":"2016","unstructured":"Kim, T.W., Werbach, K.: More than just a game: ethical issues in gamification. Ethics Inf. Technol. 18(2), 157\u2013173 (2016)","journal-title":"Ethics Inf. Technol."},{"key":"22_CR31","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/978-3-319-96367-9_2","volume-title":"Nordic Contributions in IS Research","author":"L Kuonanoja","year":"2018","unstructured":"Kuonanoja, L., Oinas-Kukkonen, H.: Recognizing and mitigating the negative effects of information technology use: a systematic review of persuasive characteristics in information systems. In: M\u00fcller, S.D., Nielsen, J.A. (eds.) SCIS 2018. LNBIP, vol. 326, pp. 14\u201325. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96367-9_2"},{"issue":"2","key":"22_CR32","first-page":"29","volume":"3","author":"B Latour","year":"1994","unstructured":"Latour, B.: On technical mediation. Common knowl. 3(2), 29\u201364 (1994)","journal-title":"Common knowl."},{"key":"22_CR33","doi-asserted-by":"crossref","unstructured":"Lee, A.S.: A scientific methodology for MIS case studies. MIS Quart. 13, 33\u201350 (1989)","DOI":"10.2307\/248698"},{"issue":"3","key":"22_CR34","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1287\/isre.14.3.221.16560","volume":"14","author":"AS Lee","year":"2003","unstructured":"Lee, A.S., Baskerville, R.L.: Generalizing generalizability in information systems research. Inf. Syst. Res. 14(3), 221\u2013243 (2003)","journal-title":"Inf. Syst. Res."},{"key":"22_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-540-77006-0_15","volume-title":"Persuasive Technology","author":"J Leth Jespersen","year":"2007","unstructured":"Leth Jespersen, J., Albrechtslund, A., \u00d8hrstr\u00f8m, P., Hasle, P., Albretsen, J.: Surveillance, persuasion, and panopticon. In: de Kort, Y., IJsselsteijn, W., Midden, C., Eggen, B., Fogg, B.J. (eds.) PERSUASIVE 2007. LNCS, vol. 4744, pp. 109\u2013120. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-77006-0_15"},{"issue":"1","key":"22_CR36","doi-asserted-by":"publisher","first-page":"44","DOI":"10.4018\/ijt.2014010104","volume":"5","author":"C Linder","year":"2014","unstructured":"Linder, C.: Are persuasive technologies really able to communicate?: some remarks to the application of discourse ethics. Int. J. Technoethics (IJT) 5(1), 44\u201358 (2014)","journal-title":"Int. J. Technoethics (IJT)"},{"key":"22_CR37","doi-asserted-by":"crossref","unstructured":"Linehan, C., Harrer, S., Kirman, B., Lawson, S., Carter, M.: Games against health: a player-centered design philosophy. In: CHI EA 2015, pp. 589\u2013600. ACM, New York (2015)","DOI":"10.1145\/2702613.2732514"},{"key":"22_CR38","doi-asserted-by":"crossref","unstructured":"Lupton, D.: Self-tracking modes: reflexive self-monitoring and data practices. In: Imminent Citizenships: Personhood and Identity Politics in the Informatic Age - Workshop. SSRN (2014)","DOI":"10.2139\/ssrn.2483549"},{"key":"22_CR39","doi-asserted-by":"crossref","unstructured":"Nystr\u00f6m, T.: Gamification of persuasive systems for sustainability. In: 2017 Sustainable Internet and ICT for Sustainability (SustainIT). IEEE (2017)","DOI":"10.23919\/SustainIT.2017.8379815"},{"issue":"6","key":"22_CR40","doi-asserted-by":"publisher","first-page":"1223","DOI":"10.1007\/s00779-012-0591-5","volume":"17","author":"H Oinas-Kukkonen","year":"2013","unstructured":"Oinas-Kukkonen, H.: A foundation for the study of behavior change support systems. Pers. Ubiquit. Comput. 17(6), 1223\u20131235 (2013)","journal-title":"Pers. Ubiquit. Comput."},{"key":"22_CR41","first-page":"28","volume":"24","author":"H Oinas-Kukkonen","year":"2009","unstructured":"Oinas-Kukkonen, H., Harjumaa, M.: Persuasive systems design: key issues, process model, and system features. Commun. Assoc. Inf. Syst. 24, 28 (2009)","journal-title":"Commun. Assoc. Inf. Syst."},{"key":"22_CR42","doi-asserted-by":"crossref","unstructured":"de Oliveira, R., Carrascal, J.P.: Towards effective ethical behavior design. In: CHI EA 2014, pp. 2149\u20132154. ACM, New York (2014)","DOI":"10.1145\/2559206.2581182"},{"key":"22_CR43","unstructured":"Page, R.E., Kray, C.: Ethics and persuasive technology: an exploratory study in the context of healthy living. In: Proceedings of the First International Workshop on Nudge & Influence Through Mobile Devices, vol. 690, pp. 19\u201322. CEUR-WS (2010)"},{"key":"22_CR44","doi-asserted-by":"crossref","unstructured":"Rawls, J.: A Theory of Justice. Revised edn. Harvard University Press, Cambridge (1999)","DOI":"10.4159\/9780674042582"},{"key":"22_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-3-642-31037-9_21","volume-title":"Persuasive Technology. Design for Health and Safety","author":"W Reitberger","year":"2012","unstructured":"Reitberger, W., G\u00fcldenpfennig, F., Fitzpatrick, G.: Persuasive technology considered harmful? An exploration of design concerns through the TV companion. In: Bang, M., Ragnemalm, E.L. (eds.) PERSUASIVE 2012. LNCS, vol. 7284, pp. 239\u2013250. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-31037-9_21"},{"issue":"1","key":"22_CR46","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1057\/jit.2014.33","volume":"30","author":"PB Seddon","year":"2015","unstructured":"Seddon, P.B., Scheepers, R.: Generalization in is research: a critique of the conflicting positions of Lee & Baskerville and Tsang & Williams. J. Inf. Technol. 30(1), 30\u201343 (2015)","journal-title":"J. Inf. Technol."},{"key":"22_CR47","unstructured":"Spahn, A.: And lead us (not) into persuasion...? persuasive technology and the ethics of communication. Sci. Eng. Ethics 18(4), 633\u2013650 (2012)"},{"key":"22_CR48","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-319-31510-2_6","volume-title":"Persuasive Technology","author":"A Stibe","year":"2016","unstructured":"Stibe, A., Cugelman, B.: Persuasive backfiring: when behavior change interventions trigger unintended negative outcomes. In: Meschtscherjakov, A., De Ruyter, B., Fuchsberger, V., Murer, M., Tscheligi, M. (eds.) PERSUASIVE 2016. LNCS, vol. 9638, pp. 65\u201377. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-31510-2_6"},{"key":"22_CR49","doi-asserted-by":"crossref","unstructured":"Stock, O., Guerini, M., Pianesi, F.: Ethical dilemmas for adaptive persuasion systems. In: AAAI 2016, pp. 4157\u20135161. AAAI Press (2016)","DOI":"10.1609\/aaai.v30i1.9803"},{"issue":"1","key":"22_CR50","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1023\/A:1009933805126","volume":"1","author":"P Sundstr\u00f6m","year":"1998","unstructured":"Sundstr\u00f6m, P.: Interpreting the notion that technology is value-neutral. Med. Health Care Philos. 1(1), 41\u201345 (1998)","journal-title":"Med. Health Care Philos."},{"key":"22_CR51","unstructured":"Sveriges Radio: SR 3 - radio news: Fifa 18 loot packs part 1 (2018). sverigesradio.se\/sida\/avsnitt\/1031434. Accessed 8 Feb 2020"},{"key":"22_CR52","unstructured":"Sveriges Radio: SR 3 - radio news: Fifa 18 loot packs part 2 (2018). sverigesradio.se\/sida\/avsnitt\/1034069. Accessed 8 Feb 2020"},{"key":"22_CR53","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/978-3-319-20306-5_18","volume-title":"Persuasive Technology","author":"J Timmer","year":"2015","unstructured":"Timmer, J., Kool, L., van Est, R.: Ethical challenges in emerging applications of persuasive technology. In: MacTavish, T., Basapur, S. (eds.) PERSUASIVE 2015. LNCS, vol. 9072, pp. 196\u2013201. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-20306-5_18"},{"key":"22_CR54","unstructured":"User testing blog: dark patterns: the sinister side of UX (2015). https:\/\/www.usertesting.com\/blog\/dark-patterns-the-sinister-side-of-ux\/. Accessed 10 Apr 2020"},{"issue":"3","key":"22_CR55","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/s11569-009-0077-8","volume":"3","author":"PP Verbeek","year":"2009","unstructured":"Verbeek, P.P.: Ambient intelligence and persuasive technology: the blurring boundaries between human and technology. NanoEthics 3(3), 231 (2009)","journal-title":"NanoEthics"},{"key":"22_CR56","unstructured":"Yetim, F.: A set of critical heuristics for value sensitive designers and users of persuasive systems. In: ECIS 2011 (2011)"},{"key":"22_CR57","unstructured":"Yin, R.K.: Case Study Research: Design and Methods, Sixth edn. Sage publications, Oaks (2017)"},{"key":"22_CR58","unstructured":"Zagal, J.P., Bj\u00f6rk, S., Lewis, C.: Dark patterns in the design of games. In: Proceedings of the Conference on Foundations of Digital Games 2013 (2013)"}],"container-title":["Lecture Notes in Business Information Processing","Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-63396-7_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,29]],"date-time":"2022-11-29T03:01:52Z","timestamp":1669690912000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-63396-7_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030633950","9783030633967"],"references-count":58,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-63396-7_22","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"value":"1865-1348","type":"print"},{"value":"1865-1356","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"21 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EMCIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European, Mediterranean, and Middle Eastern Conference on Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dubai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"emcis2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.emcis.eu","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"161","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"56","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}