{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:43:54Z","timestamp":1759092234630,"version":"3.40.3"},"publisher-location":"Cham","reference-count":51,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030642655"},{"type":"electronic","value":"9783030642662"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-64266-2_4","type":"book-chapter","created":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T07:03:24Z","timestamp":1606287804000},"page":"61-83","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A Generic Multimodels-Based Approach for the Analysis of Usability and Security of Authentication Mechanisms"],"prefix":"10.1007","author":[{"given":"Nicolas","family":"Broders","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7907-3170","authenticated-orcid":false,"given":"C\u00e9lia","family":"Martinie","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5381-971X","authenticated-orcid":false,"given":"Philippe","family":"Palanque","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0756-6934","authenticated-orcid":false,"given":"Marco","family":"Winckler","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1169-5920","authenticated-orcid":false,"given":"Kimmo","family":"Halunen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,25]]},"reference":[{"issue":"12","key":"4_CR1","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/322796.322806","volume":"42","author":"A Adams","year":"1999","unstructured":"Adams, A., Sasse, M.A.: Users are not the enemy. Commun. ACM 42(12), 40\u201346 (1999)","journal-title":"Commun. ACM"},{"issue":"5","key":"4_CR2","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1007\/s00607-017-0546-9","volume":"99","author":"A Alarifi","year":"2017","unstructured":"Alarifi, A., Alsaleh, M., Alomar, N.: A model for evaluating the security and usability of e-banking platforms. Computing 99(5), 519\u2013535 (2017). https:\/\/doi.org\/10.1007\/s00607-017-0546-9","journal-title":"Computing"},{"key":"4_CR3","first-page":"413","volume":"9","author":"M Alshamari","year":"2016","unstructured":"Alshamari, M.: A review of gaps between usability and security\/privacy. Int. J. Commun. Network Syst. Sci. 9, 413\u2013429 (2016)","journal-title":"Int. J. Commun. Network Syst. Sci."},{"issue":"5","key":"4_CR4","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/MSP.2004.71","volume":"2","author":"D Balfanz","year":"2004","unstructured":"Balfanz, D., Durfee, G., Smetters, D.K., Grinter, R.E.: In search of usable security: five lessons from the field. IEEE Secur. Priv. 2(5), 19\u201324 (2004)","journal-title":"IEEE Secur. Priv."},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Bastide, R., Palanqie, P.: A visual and formal glue between application and interaction. J. Vis. Lang. Comput. 10(5), 481\u2013507 (1999). ISSN 1045-926X","DOI":"10.1006\/jvlc.1999.0127"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Ben-Asher, N., Meyer, J., M\u00f6ller, S., Englert, R.: An experimental system for studying the tradeoff between usability and security. In: International Conference on Availability, Reliability and Security, Fukuoka, 2009, pp. 882\u2013887 (2009)","DOI":"10.1109\/ARES.2009.174"},{"key":"4_CR7","unstructured":"Bonneau, J., Schechter, S.: Towards reliable storage of 56-bit secrets in human memory. In: USENIX Security Symposium (2014)"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Bonneau, J., Herley, C., van Oorschot, P.C. Stajano, F.: The quest to replace passwords: a framework for comparative evaluation of web authentication schemes. In: 2012 IEEE Symposium on Security and Privacy, pp. 553\u2013567 (2012)","DOI":"10.1109\/SP.2012.44"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Brainard, J., Juels, A., Rivest, R.L., Szydlo, M., Yung, M.: Fourth-factor authentication: somebody you know. In: Proceedings of the 13th ACM CCS 2006, pp. 168\u2013178. ACM (2006)","DOI":"10.1145\/1180405.1180427"},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/978-3-540-74800-7_9","volume-title":"Human-Computer Interaction \u2013 INTERACT 2007","author":"C Braz","year":"2007","unstructured":"Braz, C., Seffah, A., M\u2019Raihi, D.: Designing a trade-off between usability and security: a metrics based-model. In: Baranauskas, C., Palanque, P., Abascal, J., Barbosa, S.D.J. (eds.) INTERACT 2007. LNCS, vol. 4663, pp. 114\u2013126. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74800-7_9"},{"key":"4_CR11","unstructured":"Brooke, J.: SUS - A quick and dirty usability scale (2006)"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Brostoff, S., Sasse, M.A.: Are passfaces more usable than passwords? In: A Field Trial Investigation BCS HCI Conference, People and Computers XIV\u2014Usability or Else! (2000)","DOI":"10.1007\/978-1-4471-0515-2_27"},{"key":"4_CR13","unstructured":"Card, S.K., Moran, T.P., Newell, A.: The model human processor: an engineering model of human performance. In: Handbook of Perception and Human Perf., pp. 1-35 (1986)"},{"key":"4_CR14","unstructured":"Chiasson, S., Biddle, R.: Issues in user authentication. In CHI Workshop Security User Studies Methodologies and Best Pracfices, April 2007"},{"key":"4_CR15","doi-asserted-by":"publisher","unstructured":"Clark, R.M., Hakim, S. (eds.): Cyber-Physical Security: Protecting Critical Infrastructure at the State and Local Level, vol. 3. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-32824-9","DOI":"10.1007\/978-3-319-32824-9"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"De Cristofaro, E., Du, H., Freudiger, J., Norcie, G:. A comparative usability study of two-factor authentication. In: Proceedings of the Workshop on Usable Security (USEC) (2014)","DOI":"10.14722\/usec.2014.23025"},{"key":"4_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/978-3-319-22723-8_16","volume-title":"Human-Computer Interaction \u2013 INTERACT 2015","author":"R Fahssi","year":"2015","unstructured":"Fahssi, R., Martinie, C., Palanque, P.: Enhanced task modelling for systematic identification and explicit representation of human errors. In: Abascal, J., Barbosa, S., Fetter, M., Gross, T., Palanque, P., Winckler, M. (eds.) INTERACT 2015. LNCS, vol. 9299, pp. 192\u2013212. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-22723-8_16"},{"issue":"2","key":"4_CR18","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/s00766-014-0217-8","volume":"21","author":"S Faily","year":"2016","unstructured":"Faily, S., Fl\u00e9chais, I.: Finding and resolving security misusability with misusability cases. Requirements Eng. 21(2), 209\u2013223 (2016)","journal-title":"Requirements Eng."},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Fayollas, C., Martinie, C., Navarre, D., Palanque, P.: A generic approach for assessing compatibility between task descriptions and interactive systems: application to the effectiveness of a flight control unit. i-com, 14(3), 170\u2013191 (2015)","DOI":"10.1515\/icom-2015-0037"},{"key":"4_CR20","unstructured":"Firefox password manager. https:\/\/support.mozilla.org\/en-US\/kb\/password-manager-remember-delete-edit-logins"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Florencio, D., Herley, C.: A large-scale study of web password habits. In: Proceedings of the WWW Conference 2007, pp. 657\u2013666. ACM Press (2007)","DOI":"10.1145\/1242572.1242661"},{"key":"4_CR22","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-319-48393-1_24","volume-title":"The Practice of Enterprise Modeling","author":"M Fraile","year":"2016","unstructured":"Fraile, M., Ford, M., Gadyatskaya, O., Kumar, R., Stoelinga, M., Trujillo-Rasua, R.: Using attack-defense trees to analyze threats and countermeasures in an ATM: a case study. In: Horkoff, J., Jeusfeld, Manfred A., Persson, A. (eds.) PoEM 2016. LNBIP, vol. 267, pp. 326\u2013334. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-48393-1_24"},{"key":"4_CR23","unstructured":"Golla, M., Bailey, D.V., D\u00fcrmuth, M.: I want my money back!\u201d Limiting Online Password-Guessing Financially. In: SOUPS 2017 (2017)"},{"key":"4_CR24","unstructured":"Google 2-step Verification. https:\/\/www.google.com\/landing\/2step\/. Accessed May 2020"},{"key":"4_CR25","unstructured":"Habib, H., et al.: User behaviors and attitudes under password expiration policies. In: USENIX Security Symposium 2018, pp. 13\u201330 (2018)"},{"key":"4_CR26","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1016\/j.pmcj.2017.06.017","volume":"40","author":"K Halunen","year":"2017","unstructured":"Halunen, K., H\u00e4iki\u00f6, J., Vallivaara, V.A.: Evaluation of user authentication methods in the gadget-free world. Pervasive Mob. Comput. 40, 220\u2013241 (2017)","journal-title":"Pervasive Mob. Comput."},{"key":"4_CR27","doi-asserted-by":"crossref","unstructured":"Hamon, A., Palanque, P., Silva, J.-L., Deleris, Y., Barboni, E.: Formal description of multi-touch interactions. In: 5th ACM SIGCHI Symposium on Engineering Interactive Computing Systems (EICS 2013), pp. 207\u2013216 (2013)","DOI":"10.1145\/2494603.2480311"},{"key":"4_CR28","unstructured":"He, W., et al.: Rethinking access control and authentication for the home Internet of Things (IoT). In: USENIX Security Symposium, pp. 255\u2013272 (2018)"},{"key":"4_CR29","unstructured":"ISO. \u201cISO 9241-11 :2018\u201d. ISO. International Organization for Standardization. https:\/\/www.iso.org\/standard\/63500.html"},{"key":"4_CR30","unstructured":"ISO. \u201cISO 9241-210:2019\u201d. ISO. International Organization for Standardization. Accessed 17 Feb 2020. https:\/\/www.iso.org\/standard\/77520.html"},{"key":"4_CR31","unstructured":"ISO\/IEC 27000:2018 Information technology\u2014Security techniques\u2014Information security management systems (2018)"},{"key":"4_CR32","doi-asserted-by":"crossref","unstructured":"Kainda, R., Fl\u00e9chais, I., Roscoe, A.W.: Security and usability: analysis and evaluation. In: 2010 International Conference on Availability, Reliability and Security, pp. 275\u2013282 (2010)","DOI":"10.1109\/ARES.2010.77"},{"key":"4_CR33","unstructured":"Launius, S.M.: Evaluation of Comprehensive Taxonomies for Information Technology Threats. SysAdmin, Audit, Network and Security (SANS) (2018)"},{"key":"4_CR34","doi-asserted-by":"crossref","unstructured":"Martinie, C., Navarre, D., Palanque, P., Fayollas, C.: A generic tool-supported framework for coupling task models and interactive applications. In: Proceedings of the 7th ACM SIGCHI Symposium on Engineering Interactive Computing Systems (EICS 2015). ACM DL, pp. 244\u2013253 (2015)","DOI":"10.1145\/2774225.2774845"},{"key":"4_CR35","doi-asserted-by":"crossref","unstructured":"Martinie C., Navarre D., Palanque P., Fayollas, C.: A generic tool-supported framework for coupling task models and interactive applications. In: 7th ACM SIGCHI Symposium on Engineering Interactive Computing Systems (EICS 2015). ACM DL, pp. 244\u2013253 (2015)","DOI":"10.1145\/2774225.2774845"},{"key":"4_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1007\/978-3-642-23765-2_40","volume-title":"Human-Computer Interaction \u2013 INTERACT 2011","author":"C Martinie","year":"2011","unstructured":"Martinie, C., Palanque, P., Winckler, M.: Structuring and Composition Mechanisms to Address Scalability Issues in Task Models. In: Campos, P., Graham, N., Jorge, J., Nunes, N., Palanque, P., Winckler, M. (eds.) INTERACT 2011. LNCS, vol. 6948, pp. 589\u2013609. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23765-2_40"},{"key":"4_CR37","doi-asserted-by":"crossref","unstructured":"Martinie, C., Palanque, P., Bouzekri, E., Cockburn, A., Canny, A., Barboni, E.: Analysing and demonstrating tool-supported customizable task notations. PACM Hum.-Comput. Interact. 3 (2019). EICS, Article 12, 26 pages","DOI":"10.1145\/3331154"},{"key":"4_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/978-3-030-29381-9_34","volume-title":"Human-Computer Interaction \u2013 INTERACT 2019","author":"B Merdenyan","year":"2019","unstructured":"Merdenyan, B., Petrie, H.: Perceptions of risk, benefits and likelihood of undertaking password management behaviours: four components. In: Lamas, D., Loizides, F., Nacke, L., Petrie, H., Winckler, M., Zaphiris, P. (eds.) INTERACT 2019. LNCS, vol. 11746, pp. 549\u2013563. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-29381-9_34"},{"key":"4_CR39","unstructured":"Micallef, N., Gamagedara Arachchilage, N.A.: A Gamified Approach to Improve Users\u2019 Memorability of Fall-back Authentication. SOUPS 2017 (2017)"},{"key":"4_CR40","doi-asserted-by":"crossref","unstructured":"Mihajlov, M. Jerman-Blazi\u010d, B., Josimovski, S.: A conceptual framework for evaluating usable security in authentication mechanisms - usability perspectives. In: 2011 5th International Conference on Network and System Security, Milan, 2011, pp. 332\u2013336 (2011)","DOI":"10.1109\/ICNSS.2011.6060025"},{"key":"4_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/978-3-030-54549-9_21","volume-title":"Computer Safety, Reliability, and Security","author":"H Nishihara","year":"2020","unstructured":"Nishihara, H., Kawanishi, Y., Souma, D., Yoshida, H.: On validating attack trees with attack effects. In: Casimiro, A., Ortmeier, F., Bitsch, F., Ferreira, P. (eds.) SAFECOMP 2020. LNCS, vol. 12234, pp. 309\u2013324. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-54549-9_21"},{"issue":"2","key":"4_CR42","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2004.1276113","volume":"21","author":"J Ortega-Garcia","year":"2004","unstructured":"Ortega-Garcia, J., Bigun, J., Reynolds, D., Gonzalez-Rodriguez, J.: Authentication gets personal with biometrics. IEEE Signal Process. Mag. 21(2), 50\u201362 (2004)","journal-title":"IEEE Signal Process. Mag."},{"key":"4_CR43","doi-asserted-by":"crossref","unstructured":"Palanque, P., Barboni, E., Martinie, C., Navarre, D., Winckler, M.: A model-based approach for supporting engineering usability evaluation of interaction techniques. In: 3rd ACM SIGCHI Symposium on Engineering interactive Computing Systems (EICS 2011), pp. 21\u201330 (2011)","DOI":"10.1145\/1996461.1996490"},{"key":"4_CR44","doi-asserted-by":"crossref","unstructured":"Palanque, P., Basnyat, S.: Task patterns for taking into account in an efficient and systematic way both standard and erroneous user behaviors. In: IFIP 13.5 Working Conference on Human Error, Safety and Systems Development (HESSD), pp. 109\u2013130. Kluwer Academic Publishers (2004)","DOI":"10.1007\/1-4020-8153-7_8"},{"key":"4_CR45","doi-asserted-by":"crossref","unstructured":"Petsas, T., Tsirantonakis, G., Athanasopoulos, E., Ioannidis, S.: Two-factor authentication: is the world ready? quantifying 2FA adoption. In: Proceedings of the Eighth European Workshop on System Security (EuroSec 2015). ACM, Article 4, 1\u20137 (2015)","DOI":"10.1145\/2751323.2751327"},{"issue":"4","key":"4_CR46","first-page":"439","volume":"19","author":"M Raza","year":"2012","unstructured":"Raza, M., Iqbal, M., Sharif, M., Haider, W.: A survey of password attacks and comparative analysis on methods for secure authentication. World Appl. Sci. J. 19(4), 439\u2013444 (2012)","journal-title":"World Appl. Sci. J."},{"key":"4_CR47","doi-asserted-by":"crossref","unstructured":"Rosson, M.B., Carroll, J.M.: Usability Engineering: Scenario-Based Development of Human-Computer Interaction. Elsevier (2001)","DOI":"10.1016\/B978-155860712-5\/50002-3"},{"key":"4_CR48","unstructured":"Sasse, A.: Computer security: anatomy of a usability disaster, and a plan for recovery. In: Proceedings of CHI 2003 Workshop on HCI and Security Systems. Fort Lauderdale, Florida (2003)"},{"key":"4_CR49","unstructured":"Schneier, B.: Attack Trees. Dr. Dobb\u2019s J., December 1999"},{"key":"4_CR50","doi-asserted-by":"crossref","unstructured":"Seiler-Hwang, S., Arias-Cabarcos, P., Mar\u00edn, A., Almenares, F., D\u00edaz-S\u00e1nchez, D., Becker, C.: \u201cI don\u2019t see why I would ever want to use it\u201d: analyzing the usability of popular smartphone password managers. In: Proceedings of the ACM SIGSAC CCS 2019, pp. 1937\u20131953. ACM (2019)","DOI":"10.1145\/3319535.3354192"},{"key":"4_CR51","doi-asserted-by":"crossref","unstructured":"Weaver, A.C.: Biometric authentication. Computer 39(2), 96\u201397 (2006)","DOI":"10.1109\/MC.2006.47"}],"container-title":["Lecture Notes in Computer Science","Human-Centered Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-64266-2_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,25]],"date-time":"2024-11-25T00:02:52Z","timestamp":1732492972000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-64266-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030642655","9783030642662"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-64266-2_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"25 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCSE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Centred Software Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Eindhoven","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcse2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/hcse-conference.com","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5 poster and demo papers (with a single-blind review) are also included. The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}