{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:41:49Z","timestamp":1743118909765,"version":"3.40.3"},"publisher-location":"Cham","reference-count":48,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030713041"},{"type":"electronic","value":"9783030713058"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-71305-8_18","type":"book-chapter","created":{"date-parts":[[2021,3,19]],"date-time":"2021-03-19T00:16:30Z","timestamp":1616112990000},"page":"225-234","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Model of Influence in Cybersecurity with Frames"],"prefix":"10.1007","author":[{"given":"Philip","family":"Romero-Masters","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,19]]},"reference":[{"key":"18_CR1","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1111\/j.1460-2466.1999.tb02784.x","volume":"49","author":"D Scheufele","year":"1999","unstructured":"Scheufele, D.: Framing as a theory of media effects. J. Commun. 49, 103\u2013122 (1999). https:\/\/doi.org\/10.1111\/j.1460-2466.1999.tb02784.x","journal-title":"J. Commun."},{"issue":"1","key":"18_CR2","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1080\/15205436.2015.1068811","volume":"19","author":"MA Cacciatore","year":"2016","unstructured":"Cacciatore, M.A., Scheufele, D.A., Iyengar, S.: The end of framing as we know it \u2026 and the future of media effects. Mass Commun. Soc. 19(1), 7\u201323 (2016). https:\/\/doi.org\/10.1080\/15205436.2015.1068811","journal-title":"Mass Commun. Soc."},{"issue":"1","key":"18_CR3","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1111\/j.0021-9916.2007.00326.x","volume":"57","author":"DA Scheufele","year":"2007","unstructured":"Scheufele, D.A., Tewksbury, D.: Framing, agenda setting, and priming: the evolution of three media effects models: models of media effects. J. Commun. 57(1), 9\u201320 (2007). https:\/\/doi.org\/10.1111\/j.0021-9916.2007.00326.x","journal-title":"J. Commun."},{"issue":"4","key":"18_CR4","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1111\/j.1460-2466.1993.tb01304.x","volume":"43","author":"RM Entman","year":"1993","unstructured":"Entman, R.M.: Framing: toward clarification of a fractured paradigm. J. Commun. 43(4), 51\u201358 (1993). https:\/\/doi.org\/10.1111\/j.1460-2466.1993.tb01304.x","journal-title":"J. Commun."},{"key":"18_CR5","unstructured":"Webster, J., Watson, R.T.: Analyzing the past to prepare for the future: writing a literature review, MIS Q., 26(2), xiii\u2013xxiii (2002)"},{"key":"18_CR6","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.cose.2013.05.006","volume":"39","author":"JB Barlow","year":"2013","unstructured":"Barlow, J.B., Warkentin, M., Ormond, D., Dennis, A.R.: Don\u2019t make excuses! Discouraging neutralization to reduce IT policy violation. Comput. Secur. 39, 145\u2013159 (2013). https:\/\/doi.org\/10.1016\/j.cose.2013.05.006","journal-title":"Comput. Secur."},{"issue":"1","key":"18_CR7","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1080\/10919392.2019.1552745","volume":"29","author":"AJ Burns","year":"2019","unstructured":"Burns, A.J., Johnson, M.E., Caputo, D.D.: Spear phishing in a barrel: insights from a targeted phishing campaign. J. Organ. Comput. Electron. Commer. 29(1), 24\u201339 (2019). https:\/\/doi.org\/10.1080\/10919392.2019.1552745","journal-title":"J. Organ. Comput. Electron. Commer."},{"issue":"2","key":"18_CR8","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1177\/1555343415570055","volume":"9","author":"J Chen","year":"2015","unstructured":"Chen, J., Gates, C.S., Li, N., Proctor, R.W.: Influence of risk\/safety information framing on android app-installation decisions. J. Cogn. Eng. Decis. Mak. 9(2), 149\u2013168 (2015). https:\/\/doi.org\/10.1177\/1555343415570055","journal-title":"J. Cogn. Eng. Decis. Mak."},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Das, S., Kramer, A.D.I., Dabbish, L.A., Hong, J.I.: Increasing security sensitivity with social proof: a large-scale experimental confirmation. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, Arizona, USA, November 2014, pp. 739\u2013749 (2014). http:\/\/doi.org\/10.10\/ggwmdd","DOI":"10.1145\/2660267.2660271"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Dennis, A.R., Minas, R.K.: Security on autopilot: why current security theories hijack our thinking and lead us astray. ACM SIGMIS Database DATABASE Adv. Inf. Syst. 49, 15\u201338 (2018). http:\/\/doi.org\/10.10\/gdg2q3","DOI":"10.1145\/3210530.3210533"},{"issue":"5","key":"18_CR11","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1177\/0018720815585906","volume":"57","author":"RW Proctor","year":"2015","unstructured":"Proctor, R.W., Chen, J.: The role of human factors\/ergonomics in the science of security: decision making and action selection in cyberspace. Hum. Factors 57(5), 721\u2013727 (2015)","journal-title":"Hum. Factors"},{"issue":"4481","key":"18_CR12","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1126\/science.7455683","volume":"211","author":"A Tversky","year":"1981","unstructured":"Tversky, A., Kahneman, D.: The framing of decisions and the psychology of choice. Science 211(4481), 453\u2013458 (1981). https:\/\/doi.org\/10.1126\/science.7455683","journal-title":"Science"},{"issue":"2","key":"18_CR13","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1111\/deci.12328","volume":"50","author":"AC Johnston","year":"2019","unstructured":"Johnston, A.C., et al.: Speak their language: designing effective messages to improve employees\u2019 information security decision making. Decis. Sci. Atlanta 50(2), 245\u2013284 (2019). https:\/\/doi.org\/10.1111\/deci.12328","journal-title":"Decis. Sci. Atlanta"},{"key":"18_CR14","unstructured":"Diesner, J., Kumaraguru, P., Carley, K.M.: Mental models of data privacy and security of indians extracted from texts. In: Conference Papers \u2013 International Communication Association, May 2005, pp. 1\u201313. http:\/\/search.ebscohost.com\/login.aspx?direct=true&AuthType=ip,uid&db=ufh&AN=18655489&site=ehost-live&scope=site. Accessed 10 July 2020"},{"issue":"3","key":"18_CR15","doi-asserted-by":"publisher","first-page":"33","DOI":"10.4018\/ijsodit.2013070103","volume":"3","author":"AE Laaksonen","year":"2014","unstructured":"Laaksonen, A.E., Niemimaa, M., Harnesk, D.: Influences of frame incongruence on information security policy outcomes: an interpretive case study. Int. J. Soc. Organ. Dyn. IT 3(3), 33\u201350 (2014). https:\/\/doi.org\/10.4018\/ijsodit.2013070103","journal-title":"Int. J. Soc. Organ. Dyn. IT"},{"key":"18_CR16","unstructured":"Qiu, C., Zhao, W., Jiang, J., Han, J.: A teaching model application in the course of information security. In: Proceedings of the 2011 Third International Workshop on Education Technology and Computer Science - volume 02, USA, March 2011, pp. 138\u2013141. Accessed 10 July 2020"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Raja, F., Hawkey, K., Hsu, S., Wang, K.-L.C., Beznosov, K.: A brick wall, a locked door, and a bandit: a physical security metaphor for firewall warnings. In: Proceedings of the Seventh Symposium on Usable Privacy and Security, Pittsburgh, Pennsylvania, July 2011, pp. 1\u201320. http:\/\/doi.org\/10.10\/fxp2bp","DOI":"10.1145\/2078827.2078829"},{"issue":"3","key":"18_CR18","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1007\/s11257-019-09236-5","volume":"29","author":"JH Addae","year":"2019","unstructured":"Addae, J.H., Sun, X., Towey, D., Radenkovic, M.: Exploring user behavioral data for adaptive cybersecurity. User Model. User-Adapt. Interact. 29(3), 701\u2013750 (2019). https:\/\/doi.org\/10.1007\/s11257-019-09236-5","journal-title":"User Model. User-Adapt. Interact."},{"issue":"4","key":"18_CR19","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1016\/j.cose.2006.11.004","volume":"26","author":"E Albrechtsen","year":"2007","unstructured":"Albrechtsen, E.: A qualitative study of users\u2019 view on information security. Comput. Secur. 26(4), 276\u2013289 (2007). https:\/\/doi.org\/10.1016\/j.cose.2006.11.004","journal-title":"Comput. Secur."},{"key":"18_CR20","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-3-319-07620-1_12","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"Y-Y Choong","year":"2014","unstructured":"Choong, Y.-Y.: A Cognitive-Behavioral Framework of User Password Management Lifecycle. In: Tryfonas, T., Askoxylakis, I. (eds.) Human Aspects of Information Security, Privacy, and Trust, vol. 8533, pp. 127\u2013137. Springer, Cham (2014)"},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"Hirshfield, L., et al.: The Role of Human Operators\u2019 Suspicion in the Detection of Cyber Attacks, pp. 1482\u20131499 (2019)","DOI":"10.4018\/978-1-5225-8897-9.ch074"},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"Huang, D.-L., Rau, P.-L., Salvendy, G.: A Survey of Factors Influencing People\u2019s Perception of Information Security. 2007, vol. 4553, pp. 906\u2013915 (2007)","DOI":"10.1007\/978-3-540-73111-5_100"},{"key":"18_CR23","unstructured":"Lee, V.C.: Examining the Relationship between Autonomy, Competence, and Relatedness and Security Policy Compliant Behavior, Ph.D., Northcentral University, United States \u2013 Arizona (2015)"},{"issue":"3","key":"18_CR24","doi-asserted-by":"publisher","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"FD Davis","year":"1989","unstructured":"Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q. 13(3), 319\u2013340 (1989). https:\/\/doi.org\/10.2307\/249008","journal-title":"MIS Q."},{"key":"18_CR25","doi-asserted-by":"crossref","unstructured":"Busch, M., Patil, S., Regal, G., Hochleitner, C., Tscheligi, M.: Persuasive information security: techniques to help employees protect organizational information security. In: Proceedings of the 11th International Conference on Persuasive Technology - Volume 9638, Salzburg, Austria, pp. 339\u2013351 (2016). http:\/\/doi.org\/10.10\/ggwmfr","DOI":"10.1007\/978-3-319-31510-2_29"},{"key":"18_CR26","doi-asserted-by":"crossref","unstructured":"Kankane, S., DiRusso, C., Buckley, C.: Can we nudge users toward better password management? an initial study. In: Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems, Montreal QC, Canada, pp. 1\u20136 (2018). http:\/\/doi.org\/10.10\/ggwmcz","DOI":"10.1145\/3170427.3188689"},{"key":"18_CR27","unstructured":"Pope, M.B.: Time orientation, rational choice and deterrence \u2013 an information systems perspective, ProQuest Information & Learning (2014)"},{"key":"18_CR28","unstructured":"Weirich, D., Sasse, M.A.: Persuasive password security. In: CHI 2001 Extended Abstracts on Human Factors in Computing Systems, Seattle, Washington, March 2001, pp. 139\u2013140 (2001). http:\/\/doi.org\/10.10\/fkhtkx"},{"key":"18_CR29","doi-asserted-by":"crossref","unstructured":"Zhang, C., Simon, J.C.: \u201cTed\u201d Lee, \u201cAn Empirical Investigation of Decision Making in IT-Related Dilemmas: Impact of Positive and Negative Consequence Information,\u201d J. Organ. End User Comput. Hershey, vol. 28, no. 4, p. 73 (2016). http:\/\/doi.org\/10.10\/f873bx","DOI":"10.4018\/JOEUC.2016100105"},{"issue":"4","key":"18_CR30","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1007\/s00779-016-0938-4","volume":"20","author":"D Jeske","year":"2016","unstructured":"Jeske, D., Briggs, P., Coventry, L.: Exploring the relationship between impulsivity and decision-making on mobile devices. Pers. Ubiquitous Comput. 20(4), 545\u2013557 (2016). https:\/\/doi.org\/10.1007\/s00779-016-0938-4","journal-title":"Pers. Ubiquitous Comput."},{"key":"18_CR31","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.cose.2014.03.003","volume":"43","author":"M Kajzer","year":"2014","unstructured":"Kajzer, M., D\u2019Arcy, J., Crowell, C.R., Striegel, A., Van Bruggen, D.: An exploratory investigation of message-person congruence in information security awareness campaigns. Comput. Secur. 43, 64\u201376 (2014). https:\/\/doi.org\/10.1016\/j.cose.2014.03.003","journal-title":"Comput. Secur."},{"issue":"5","key":"18_CR32","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1080\/0144929X.2018.1539519","volume":"38","author":"Y Li","year":"2019","unstructured":"Li, Y., Zhang, N., Siponen, M.: Keeping secure to the end: a long-term perspective to understand employees\u2019 consequence-delayed information security violation. Behav. Inf. Technol. 38(5), 435\u2013453 (2019). https:\/\/doi.org\/10.1080\/0144929X.2018.1539519","journal-title":"Behav. Inf. Technol."},{"key":"18_CR33","doi-asserted-by":"crossref","unstructured":"Anderson, B.B., Jenkins, J.L., Vance, A., Kirwan, C.B., Eargle, D.: Your memory is working against you, Decis. Support Syst., 92, 3\u201313 (2016). http:\/\/doi.org\/10.10\/ggjc9b","DOI":"10.1016\/j.dss.2016.09.010"},{"issue":"4","key":"18_CR34","doi-asserted-by":"publisher","first-page":"880","DOI":"10.1287\/isre.2016.0644","volume":"27","author":"JL Jenkins","year":"2016","unstructured":"Jenkins, J.L., Anderson, B.B., Vance, A., Kirwan, C.B., Eargle, D.: More harm than good? how messages that interrupt can make us vulnerable. Inf. Syst. Res. 27(4), 880\u2013896 (2016). https:\/\/doi.org\/10.1287\/isre.2016.0644","journal-title":"Inf. Syst. Res."},{"key":"18_CR35","doi-asserted-by":"publisher","unstructured":"Mathur, A.: A Human-Centered Approach to Improving The User Experience Of Software Updates, Thesis (2016). https:\/\/doi.org\/10.13016\/M2N220","DOI":"10.13016\/M2N220"},{"issue":"3","key":"18_CR36","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1080\/0144929X.2012.708787","volume":"33","author":"J Abawajy","year":"2014","unstructured":"Abawajy, J.: User preference of cyber security awareness delivery methods. Behav. Inf. Technol. 33(3), 237\u2013248 (2014)","journal-title":"Behav. Inf. Technol."},{"key":"18_CR37","doi-asserted-by":"crossref","unstructured":"Cuchta, T., et al.: Human risk factors in cybersecurity. In: Proceedings of the 20th Annual SIG Conference on Information Technology Education, Tacoma, WA, USA, September 2019, pp. 87\u201392 (2019). http:\/\/doi.org\/10.10\/ggwmch","DOI":"10.1145\/3349266.3351407"},{"issue":"1","key":"18_CR38","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.compedu.2008.06.011","volume":"52","author":"RS Shaw","year":"2009","unstructured":"Shaw, R.S., Chen, C.C., Harris, A.L., Huang, H.-J.: The impact of information richness on information security awareness training effectiveness. Comput. Educ. 52(1), 92\u2013100 (2009). https:\/\/doi.org\/10.1016\/j.compedu.2008.06.011","journal-title":"Comput. Educ."},{"key":"18_CR39","doi-asserted-by":"crossref","unstructured":"Papadaki, K., Polemi, D.: Collaboration and knowledge sharing platform for supporting a risk management network of practice. In: 2008 Third International Conference on Internet and Web Applications and Services, June 2008, pp. 239\u2013244 (2008). http:\/\/doi.org\/10.10\/d2rvcz","DOI":"10.1109\/ICIW.2008.78"},{"issue":"5","key":"18_CR40","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/MSP.2012.126","volume":"10","author":"SW Smith","year":"2012","unstructured":"Smith, S.W.: Security and cognitive bias: exploring the role of the mind. IEEE Secur. Priv. 10(5), 75\u201378 (2012). https:\/\/doi.org\/10.1109\/MSP.2012.126","journal-title":"IEEE Secur. Priv."},{"key":"18_CR41","doi-asserted-by":"crossref","unstructured":"Briggs, P., Jeske, D., Coventry, L.: Behavior change interventions for cybersecurity. In: Little, L., Sillence, E., Joinson, A. (eds.) Behavior Change Research and Theory: Psychological and Technological Perspectives, San Diego, CA: Elsevier Academic Press, pp. 115\u2013136 (2017)","DOI":"10.1016\/B978-0-12-802690-8.00004-9"},{"issue":"1","key":"18_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.giq.2017.02.007","volume":"34","author":"H de Bruijn","year":"2017","unstructured":"de Bruijn, H., Janssen, M.: Building Cybersecurity Awareness: The need for evidence-based framing strategies. Gov. Inf. Q. 34(1), 1\u20137 (2017). https:\/\/doi.org\/10.1016\/j.giq.2017.02.007","journal-title":"Gov. Inf. Q."},{"key":"18_CR43","doi-asserted-by":"crossref","unstructured":"Houston, N.: The impact of human behavior on cyber security. In: Khosrow-Pour, M. (ed.) Multigenerational Online Behavior and Media Use: Concepts, Methodologies, Tools, and Applications, Hershey, PA: Information Science Reference\/IGI Global, 2019, pp. 1245\u20131266 (2019)","DOI":"10.4018\/978-1-5225-7909-0.ch068"},{"key":"18_CR44","doi-asserted-by":"crossref","unstructured":"Liu, X.M.: The cyber acumen: an integrative framework to understand average users\u2019 decision-making processes in cybersecurity. In: Yan, Z. (ed.) Analyzing Human Behavior in Cyberspace, Hershey, PA: Information Science Reference\/IGI Global, 2019, pp. 192\u2013208 (2019)","DOI":"10.4018\/978-1-5225-7128-5.ch011"},{"issue":"4","key":"18_CR45","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1016\/j.cose.2011.12.010","volume":"31","author":"SL Pfleeger","year":"2012","unstructured":"Pfleeger, S.L., Caputo, D.D.: Leveraging behavioral science to mitigate cyber security risk. Comput. Secur. 31(4), 597\u2013611 (2012). https:\/\/doi.org\/10.1016\/j.cose.2011.12.010","journal-title":"Comput. Secur."},{"key":"18_CR46","doi-asserted-by":"crossref","unstructured":"Tsohou, A., Karyda, M., Kokolakis, S.: Analyzing the role of cognitive and cultural biases in the internalization of information security policies. Comput. Secur., vol. 52, no. C, pp. 128\u2013141, July 2015 (2015). http:\/\/doi.org\/10.10\/f82r6w","DOI":"10.1016\/j.cose.2015.04.006"},{"key":"18_CR47","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1016\/j.chb.2017.03.002","volume":"72","author":"EJ Williams","year":"2017","unstructured":"Williams, E.J., Beardmore, A., Joinson, A.N.: Individual differences in susceptibility to online influence: a theoretical review. Comput. Hum. Behav. 72, 412\u2013421 (2017). https:\/\/doi.org\/10.1016\/j.chb.2017.03.002","journal-title":"Comput. Hum. Behav."},{"issue":"3","key":"18_CR48","doi-asserted-by":"publisher","first-page":"567","DOI":"10.2307\/2952075","volume":"91","author":"TE Nelson","year":"1997","unstructured":"Nelson, T.E., Clawson, R.A., Oxley, Z.M.: Media framing of a civil liberties conflict and its effect on tolerance. Am. Polit. Sci. Rev. 91(3), 567\u2013583 (1997). https:\/\/doi.org\/10.2307\/2952075","journal-title":"Am. Polit. Sci. Rev."}],"container-title":["Lecture Notes in Computer Science","Diversity, Divergence, Dialogue"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-71305-8_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,5]],"date-time":"2021-05-05T20:12:47Z","timestamp":1620245567000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-71305-8_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030713041","9783030713058"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-71305-8_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"19 March 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"iConference","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 March 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 March 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iconference2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ischools.org\/iConference","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"ConfTool","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"225","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"59","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}