{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T17:14:07Z","timestamp":1777482847935,"version":"3.51.4"},"publisher-location":"Cham","reference-count":49,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030656096","type":"print"},{"value":"9783030656102","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-65610-2_17","type":"book-chapter","created":{"date-parts":[[2020,12,5]],"date-time":"2020-12-05T09:03:39Z","timestamp":1607159019000},"page":"267-287","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Estimating the Cost of Cybersecurity Activities with CAsPeA: A Case Study and Comparative Analysis"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7293-2956","authenticated-orcid":false,"given":"Rafa\u0142","family":"Leszczyna","sequence":"first","affiliation":[]},{"given":"Adrian","family":"Litwin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,6]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Accenture and Ponemon Institute: The cost of cybercrime: ninth annual cost of cybercrime study. Technical report (2019)","DOI":"10.1016\/S1353-4858(19)30032-7"},{"key":"17_CR2","first-page":"26","volume":"84","author":"LA Gordon","year":"2002","unstructured":"Gordon, L.A., Loeb, M.: Return on information security investments: myths vs. realities. J. Strateg. Financ. 84, 26\u201332 (2002)","journal-title":"J. Strateg. Financ."},{"key":"17_CR3","doi-asserted-by":"publisher","unstructured":"Chapman, T.A., Reithel, B.J.: Perceptions of cybersecurity readiness among workgroup IT managers. J. Comput. Inf. Syst. 1\u201312 (2020). https:\/\/doi.org\/10.1080\/08874417.2019.1703224","DOI":"10.1080\/08874417.2019.1703224"},{"key":"17_CR4","first-page":"55","volume":"38","author":"W Sonnenreich","year":"2006","unstructured":"Sonnenreich, W., Albanese, J., Stout, B.: Return on security investment (ROSI): a practical quantitative model. J. Res. Pract. Inf. Technol. 38, 55\u201366 (2006)","journal-title":"J. Res. Pract. Inf. Technol."},{"key":"17_CR5","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-3-030-19538-0_5","volume-title":"Cybersecurity in the Electricity Sector","author":"R Leszczyna","year":"2019","unstructured":"Leszczyna, R.: Cost of cybersecurity management. Cybersecurity in the Electricity Sector, pp. 127\u2013147. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-19538-0_5"},{"issue":"1","key":"17_CR6","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1049\/iet-ifs.2013.0159","volume":"9","author":"R Leszczyna","year":"2015","unstructured":"Leszczyna, R.: Approaching secure industrial control systems. IET Inf. Secur. 9(1), 81\u201389 (2015)","journal-title":"IET Inf. Secur."},{"issue":"7","key":"17_CR7","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/S1361-3723(13)70063-0","volume":"2013","author":"R Leszczyna","year":"2013","unstructured":"Leszczyna, R.: Cost assessment of computer security activities. Comput. Fraud Secur. 2013(7), 11\u201316 (2013)","journal-title":"Comput. Fraud Secur."},{"key":"17_CR8","unstructured":"Rafa\u0142, L.: Metoda szacowania kosztu zarza\u0327dzania bezpiecze\u0144stwem informacji i przyk\u0142ad jej zastosowania w zak\u0142adzie opieki zdrowotnej. Zeszyty Kolegium Analiz Ekonomicznych (2017)"},{"key":"17_CR9","unstructured":"Martin, K.: Controlling der information security. In: Dieter, B.R., Ralf (eds.) Praxiswissen IT-Sicherheit: Praxishandbuch fur Aufbau, Zertifizierung und Betrieb, chapter 03710. T\u00dcV Media, 19 edn. (2011)"},{"key":"17_CR10","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-642-39498-0_1","volume-title":"The Economics of Information Security and Privacy","author":"M Brecht","year":"2013","unstructured":"Brecht, M., Nowey, T.: A closer look at information security costs. In: B\u00f6hme, R. (ed.) The Economics of Information Security and Privacy, pp. 3\u201324. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39498-0_1"},{"key":"17_CR11","unstructured":"Detica and Office of Cyber Security and Information Assurance: The cost of cyber crime. Technical report (2011)"},{"key":"17_CR12","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/978-3-642-39498-0_12","volume-title":"The Economics of Information Security and Privacy","author":"R Anderson","year":"2013","unstructured":"Anderson, R., et al.: Measuring the cost of cybercrime. In: B\u00f6hme, R. (ed.) The Economics of Information Security and Privacy, pp. 265\u2013300. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39498-0_12"},{"issue":"3","key":"17_CR13","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1257\/jep.23.3.3","volume":"23","author":"T Moore","year":"2009","unstructured":"Moore, T., Clayton, R., Anderson, R.: The economics of online crime. J. Econ. Perspect. 23(3), 3\u201320 (2009)","journal-title":"J. Econ. Perspect."},{"key":"17_CR14","doi-asserted-by":"publisher","first-page":"431","DOI":"10.3233\/JCS-2003-11308","volume":"11","author":"K Campbell","year":"2003","unstructured":"Campbell, K., Gordon, L.A., Loeb, M.P., Zhou, L.: The economic cost of publicly announced information security breaches: empirical evidence from the stock market. J. Comput. Secur. 11, 431\u2013448 (2003)","journal-title":"J. Comput. Secur."},{"key":"17_CR15","unstructured":"Riek, M., B\u00f6hme, R., Ciere, M., Ga\u00f1\u00e1n, C., van Eeten, M.: Estimating the costs of consumer-facing cybercrime: a tailored instrument and representative data for six EU countries (2016)"},{"key":"17_CR16","doi-asserted-by":"publisher","unstructured":"Farahmand, F., Navathe, S.B., Sharp, G.P., Enslow, P.H.: Evaluating damages caused by information systems security incidents. In: Camp, L.J., Lewis, S. (eds.) Economics of Information Security. Advances in Information Security, vol. 12. Springer, Boston (2004). https:\/\/doi.org\/10.1007\/1-4020-8090-5_7","DOI":"10.1007\/1-4020-8090-5_7"},{"key":"17_CR17","series-title":"International Series in Operations Research & Management Science","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/978-3-030-44814-1_15","volume-title":"Supply Chain Disruption Management","author":"T Sawik","year":"2020","unstructured":"Sawik, T.: Selection of cybersecurity safequards portfolio. Supply Chain Disruption Management. ISORMS, vol. 291, pp. 427\u2013448. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-44814-1_15"},{"key":"17_CR18","series-title":"AIRO Springer Series","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-3-030-00473-6_22","volume-title":"New Trends in Emerging Complex Real Life Problems","author":"P Daniele","year":"2018","unstructured":"Daniele, P., Scrimali, L.: Strong nash equilibria for cybersecurity investments with nonlinear budget constraints. In: Daniele, P., Scrimali, L. (eds.) New Trends in Emerging Complex Real Life Problems. ASS, vol. 1, pp. 199\u2013207. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00473-6_22"},{"key":"17_CR19","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/s10479-016-2209-1","volume":"248","author":"A Nagurney","year":"2016","unstructured":"Nagurney, A., Daniele, P., Shukla, S.: A supply chain network game theory model of cybersecurity investments with nonlinear budget constraints. Ann. Oper. Res. 248, 405\u2013427 (2016). https:\/\/doi.org\/10.1007\/s10479-016-2209-1","journal-title":"Ann. Oper. Res."},{"key":"17_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-642-03549-4_9","volume-title":"Financial Cryptography and Data Security","author":"C Ioannidis","year":"2009","unstructured":"Ioannidis, C., Pym, D., Williams, J.: Investments and trade-offs in the economics of information security. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 148\u2013166. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03549-4_9"},{"key":"17_CR21","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/978-1-4419-6967-5_11","volume-title":"Economics of Information Security and Privacy","author":"K Tatsumi","year":"2010","unstructured":"Tatsumi, K., Goto, M.: Optimal timing of information security investment: a real options approach. In: Moore, T., Pym, D., Ioannidis, C. (eds.) Economics of Information Security and Privacy, pp. 211\u2013228. Springer, Boston (2010). https:\/\/doi.org\/10.1007\/978-1-4419-6967-5_11"},{"key":"17_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-642-17197-0_2","volume-title":"Decision and Game Theory for Security","author":"R B\u00f6hme","year":"2010","unstructured":"B\u00f6hme, R., F\u00e9legyh\u00e1zi, M.: Optimal information security investment with penetration testing. In: Alpcan, T., Butty\u00e1n, L., Baras, J.S. (eds.) GameSec 2010. LNCS, vol. 6442, pp. 21\u201337. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-17197-0_2"},{"issue":"2","key":"17_CR23","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/s10796-017-9737-3","volume":"21","author":"T Bandyopadhyay","year":"2017","unstructured":"Bandyopadhyay, T., Mookerjee, V.: A model to analyze the challenge of using cyber insurance. Inf. Syst. Front. 21(2), 301\u2013325 (2017). https:\/\/doi.org\/10.1007\/s10796-017-9737-3","journal-title":"Inf. Syst. Front."},{"key":"17_CR24","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-3-030-11039-0_16","volume-title":"E-Business and Telecommunications","author":"DN Bartolini","year":"2019","unstructured":"Bartolini, D.N., Benavente-Peces, C., Ahrens, A.: Using risk assessments to assess insurability in the context of cyber insurance. In: Obaidat, M.S., Cabello, E. (eds.) ICETE 2017. CCIS, vol. 990, pp. 337\u2013345. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-11039-0_16"},{"issue":"2","key":"17_CR25","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/1870178.1870196","volume":"38","author":"R Pal","year":"2010","unstructured":"Pal, R., Golubchik, L.: On the economics of information security. ACM SIGMETRICS Perform. Eval. Rev. 38(2), 51 (2010)","journal-title":"ACM SIGMETRICS Perform. Eval. Rev."},{"key":"17_CR26","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-1-4419-6967-5_12","volume-title":"Economics of Information Security and Privacy","author":"N Shetty","year":"2010","unstructured":"Shetty, N., Schwartz, G., Felegyhazi, M., Walrand, J.: Competitive cyber-insurance and internet security. In: Moore, T., Pym, D., Ioannidis, C. (eds.) Economics of Information Security and Privacy. CCIS, pp. 229\u2013247. Springer, Boston (2010). https:\/\/doi.org\/10.1007\/978-1-4419-6967-5_12"},{"key":"17_CR27","doi-asserted-by":"publisher","unstructured":"Havakhor, T., Rahman, M., Zhang, T.: Cybersecurity investments and the cost of capital. SSRN Electron. J. (2020). https:\/\/doi.org\/10.2139\/ssrn.3553470","DOI":"10.2139\/ssrn.3553470"},{"key":"17_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/978-3-030-36027-6_13","volume-title":"Economics of Grids, Clouds, Systems, and Services","author":"B Rodrigues","year":"2019","unstructured":"Rodrigues, B., Franco, M., Parangi, G., Stiller, B.: SEConomy: a framework for the economic assessment of cybersecurity. In: Djemame, K., Altmann, J., Ba\u00f1ares, J.\u00c1., Agmon Ben-Yehuda, O., Naldi, M. (eds.) GECON 2019. LNCS, vol. 11819, pp. 154\u2013166. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-36027-6_13"},{"key":"17_CR29","doi-asserted-by":"crossref","unstructured":"Chessa, M., Loiseau, P.: A cooperative game-theoretic approach to quantify the value of personal data in networks (2016)","DOI":"10.1145\/3106723.3106732"},{"key":"17_CR30","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-642-16806-2_1","volume-title":"Critical Infrastructure Protection IV","author":"N Robinson","year":"2010","unstructured":"Robinson, N., Potoglou, D., Kim, C., Burge, P., Warnes, R.: Security at what cost? In: Moore, T., Shenoi, S. (eds.) ICCIP 2010. IAICT, vol. 342, pp. 3\u201315. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-16806-2_1"},{"key":"17_CR31","unstructured":"Ponemon Institue and IBM: Data breach risk calculator. Website (2016)"},{"key":"17_CR32","unstructured":"The Economist Intelligence Unit: CyberTab: free tool estimates damages from attacks (2014)"},{"key":"17_CR33","unstructured":"Websense: TCO calculator: websense hosted email security calculator. Website (2016)"},{"key":"17_CR34","unstructured":"Symantec: Small business risk calculator. Website (2016)"},{"key":"17_CR35","unstructured":"Su, X.: An overview of economic approaches to information security management. Technical report, University of Twente (2006)"},{"key":"17_CR36","unstructured":"Rezmierski, V., Deering, S., Fazio, A., Ziobro, S.: Incident cost analysis and modeling project. Final Report. Technical report, Committee on Institutional Cooperation Chief Information Officers Committee (1998)"},{"key":"17_CR37","unstructured":"Rezmierski, V., Carroll, A., Hine, J.: Incident cost analysis and modeling project II. Final Report. Technical report, Committee on Institutional Cooperation Chief Information Officers Committee (2000)"},{"key":"17_CR38","doi-asserted-by":"crossref","unstructured":"Butler, S.A.: Security attribute evaluation method: a cost-benefit approach. In: Proceedings of the 24th International Conference on Software Engineering - ICSE 2002, p. 232. ACM Press, New York (2002)","DOI":"10.1145\/581368.581370"},{"key":"17_CR39","unstructured":"Xie, N., Mead, N.R.: SQUARE project: cost\/benefit analysis framework for information security improvement projects in small companies. Technical report, Carnegie Mellon University (2004)"},{"key":"17_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-540-74143-5_5","volume-title":"Advances in Cryptology - CRYPTO 2007","author":"R Anderson","year":"2007","unstructured":"Anderson, R., Moore, T.: Information security economics \u2013 and beyond. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 68\u201391. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74143-5_5"},{"issue":"6","key":"17_CR41","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/777313.777327","volume":"46","author":"RT Mercuri","year":"2003","unstructured":"Mercuri, R.T.: Analyzing security costs. Commun. ACM 46(6), 15\u201318 (2003)","journal-title":"Commun. ACM"},{"issue":"3","key":"17_CR42","first-page":"25","volume":"19","author":"NM Radziwill","year":"2017","unstructured":"Radziwill, N.M., Benton, M.C.: Cybersecurity cost of quality: managing the costs of cybersecurity risk management. Softw. Qual. Prof. 19(3), 25\u201343 (2017)","journal-title":"Softw. Qual. Prof."},{"key":"17_CR43","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1093\/cybsec\/tyw008","volume":"2","author":"CD Heitzenrater","year":"2016","unstructured":"Heitzenrater, C.D., Simpson, A.: Policy, statistics and questions: reflections on UK cyber security disclosures. J. Cybersecur. 2, 43\u201356 (2016)","journal-title":"J. Cybersecur."},{"key":"17_CR44","first-page":"34","volume":"1","author":"M Akbari Roumani","year":"2016","unstructured":"Akbari Roumani, M., Fung, C., Rai, S., Xie, H.: Value analysis of cyber security based on attack types. ITMSOC: Trans. Innov. Bus. Eng. 1, 34\u201339 (2016)","journal-title":"ITMSOC: Trans. Innov. Bus. Eng."},{"key":"17_CR45","doi-asserted-by":"publisher","first-page":"759","DOI":"10.3233\/JCS-150538","volume":"23","author":"Y Mallios","year":"2015","unstructured":"Mallios, Y., Bauer, L., Kaynar, D., Martinelli, F., Morisset, C.: Probabilistic cost enforcement of security policies. J. Comput. Secur. 23, 759\u2013787 (2015)","journal-title":"J. Comput. Secur."},{"key":"17_CR46","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1016\/j.procs.2015.03.041","volume":"44","author":"Y Yang","year":"2015","unstructured":"Yang, Y., Jing, D., Wang, Q.: Shaping the effort of developing secure software. Procedia Comput. Sci. 44, 609\u2013618 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"17_CR47","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2014.09.002","volume":"48","author":"M Zineddine","year":"2015","unstructured":"Zineddine, M.: Vulnerabilities and mitigation techniques toning in the cloud: a cost and vulnerabilities coverage optimization approach using Cuckoo search algorithm with L\u00e9vy flights. Comput. Secur. 48, 1\u201318 (2015)","journal-title":"Comput. Secur."},{"key":"17_CR48","unstructured":"National Institute of Standards and Technology (NIST): NIST SP 800\u201353 Rev. 4 Recommended Security Controls for Federal Information Systems and Organizations. U.S. Government Printing Office (2013)"},{"key":"17_CR49","unstructured":"Dittrich, D.A.: Developing an effective incident cost analysis mechanism. Internet (2002)"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-65610-2_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T18:47:47Z","timestamp":1710269267000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-65610-2_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030656096","9783030656102"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-65610-2_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"6 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jammu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/isrdc.iitb.ac.in\/iciss2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"52","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"In addition, 3 work-in-progress papers were published.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}