{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:40:37Z","timestamp":1762508437747,"version":"3.40.3"},"publisher-location":"Cham","reference-count":48,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030723781"},{"type":"electronic","value":"9783030723798"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-72379-8_22","type":"book-chapter","created":{"date-parts":[[2021,3,29]],"date-time":"2021-03-29T19:02:45Z","timestamp":1617044565000},"page":"442-467","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Privacy by Design for Neuropsychological Studies Based on an mHealth App"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2660-4350","authenticated-orcid":false,"given":"Alexander","family":"Gabel","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7940-1178","authenticated-orcid":false,"given":"Funda","family":"Ertas","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5398-3694","authenticated-orcid":false,"given":"Michael","family":"Pleger","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7864-5437","authenticated-orcid":false,"given":"Ina","family":"Schiering","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4450-9936","authenticated-orcid":false,"given":"Sandra Verena","family":"M\u00fcller","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,30]]},"reference":[{"key":"22_CR1","unstructured":"Aschenbrenner, S., Tucha, O., Lange, K.W.: Regensburger Wortfl\u00fcssigkeits-Test. Hogrefe (2000)"},{"issue":"2","key":"22_CR2","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1038\/scientificamerican0871-82","volume":"225","author":"RC Atkinson","year":"1971","unstructured":"Atkinson, R.C., Shiffrin, R.M.: The control of short-term memory. Sci. Am. 225(2), 82\u201391 (1971)","journal-title":"Sci. Am."},{"key":"22_CR3","doi-asserted-by":"publisher","unstructured":"Baddeley, A.D., Hitch, G.: Working memory. In: Bower, G.H. (ed.) Psychology of Learning and Motivation, vol. 8, pp. 47\u201389. Academic Press (1974). https:\/\/doi.org\/10.1016\/S0079-7421(08)60452-1, http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0079742108604521","DOI":"10.1016\/S0079-7421(08)60452-1"},{"issue":"1","key":"22_CR4","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1186\/1471-2377-13-64","volume":"13","author":"D Bertens","year":"2013","unstructured":"Bertens, D., Fasotti, L., Boelen, D.H., Kessels, R.P.: A randomized controlled trial on errorless learning in goal management training: study rationale and protocol. BMC Neurol. 13(1), 64 (2013). https:\/\/doi.org\/10.1186\/1471-2377-13-64","journal-title":"BMC Neurol."},{"key":"22_CR5","unstructured":"Bonawitz, K., et al.: Practical secure aggregation for privacy preserving machine learning. Cryptology ePrint Archive, Report 2017\/281 (2017). https:\/\/eprint.iacr.org\/2017\/281"},{"key":"22_CR6","unstructured":"Brooke, J.: SUS - a quick and dirty usability scale. Usability Eval. Ind. 189(194), 4\u20137 (1996). http:\/\/www.usabilitynet.org\/trump\/documents\/Suschapt.doc"},{"issue":"3","key":"22_CR7","doi-asserted-by":"publisher","first-page":"e70","DOI":"10.2196\/jmir.2058","volume":"14","author":"JA Cafazzo","year":"2012","unstructured":"Cafazzo, J.A., Casselman, M., Hamming, N., Katzman, D.K., Palmert, M.R.: Design of an mHealth App for the self-management of adolescent type 1 diabetes: a pilot study. J. Med. Internet Res. 14(3), e70 (2012). https:\/\/doi.org\/10.2196\/jmir.2058","journal-title":"J. Med. Internet Res."},{"key":"22_CR8","doi-asserted-by":"publisher","unstructured":"Colesky, M., Hoepman, J.H., Hillen, C.: A critical analysis of privacy design strategies. In: 2016 IEEE Security and Privacy Workshops (SPW), pp. 33\u201340 (2016). https:\/\/doi.org\/10.1109\/SPW.2016.23","DOI":"10.1109\/SPW.2016.23"},{"key":"22_CR9","unstructured":"Colesky, M., et al.: Privacy patterns. https:\/\/privacypatterns.org\/. Accessed 10 June 2020"},{"key":"22_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79228-4_1","volume-title":"Theory and Applications of Models of Computation","author":"C Dwork","year":"2008","unstructured":"Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1\u201319. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-79228-4_1"},{"key":"22_CR11","unstructured":"Emmanouel, A.: Look at the frontal side of life: anterior brain pathology and everyday executive function: assessment approaches and treatment. Ph.D. thesis, Radboud University (2017). http:\/\/repository.ubn.ru.nl\/handle\/2066\/166754"},{"key":"22_CR12","unstructured":"Regulation (EU) 2016\/679 of the European parliament and of the council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/46\/EC (general data protection regulation). Official Journal of the European Union L119, pp. 1\u201388, May 2016. http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=OJ:L:2016:119:TOC"},{"key":"22_CR13","doi-asserted-by":"publisher","unstructured":"Gabel, A., Ertas, F., Pleger, M., Schiering, I., M\u00fcller, S.: Privacy-preserving metrics for an mHealth App in the context of neuropsychological studies. In: Proceedings of the 13th International Joint Conference on Biomedical Engineering Systems and Technologies - Volume 5: HEALTHINF, pp. 166\u2013177. SciTePress (2020). https:\/\/doi.org\/10.5220\/0008982801660177, https:\/\/www.scitepress.org\/DigitalLibrary\/Link.aspx?doi=10.5220\/0008982801660177","DOI":"10.5220\/0008982801660177"},{"key":"22_CR14","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/978-3-030-16744-8_11","volume-title":"Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data","author":"A Gabel","year":"2019","unstructured":"Gabel, A., Schiering, I.: Privacy patterns for pseudonymity. In: Kosta, E., Pierson, J., Slamanig, D., Fischer-H\u00fcbner, S., Krenn, S. (eds.) Privacy and Identity 2018. IAICT, vol. 547, pp. 155\u2013172. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-16744-8_11"},{"key":"22_CR15","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1007\/978-3-319-92925-5_22","volume-title":"Privacy and Identity Management. The Smart Revolution","author":"A Gabel","year":"2018","unstructured":"Gabel, A., Schiering, I., M\u00fcller, S.V., Ertas, F.: mHealth applications for goal management training - privacy engineering in neuropsychological studies. In: Hansen, M., Kosta, E., Nai-Fovino, I., Fischer-H\u00fcbner, S. (eds.) Privacy and Identity 2017. IAICT, vol. 526, pp. 330\u2013345. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-92925-5_22"},{"issue":"4","key":"22_CR16","doi-asserted-by":"publisher","first-page":"1053","DOI":"10.1109\/JBHI.2015.2446195","volume":"20","author":"E Garcia-Ceja","year":"2016","unstructured":"Garcia-Ceja, E., Osmani, V., Mayora, O.: Automatic stress detection in working environments from smartphones\u2019 accelerometer data: a first step. IEEE J. Biomed. Health Inform. 20(4), 1053\u20131060 (2016). https:\/\/doi.org\/10.1109\/JBHI.2015.2446195","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"22_CR17","unstructured":"Goodfellow, I., et al.: Generative adversarial nets. In: Ghahramani, Z., Welling, M., Cortes, C., Lawrence, N.D., Weinberger, K.Q. (eds.) Advances in Neural Information Processing Systems 27, pp. 2672\u20132680. Curran Associates, Inc. (2014). https:\/\/papers.nips.cc\/paper\/5423-generative-adversarial-nets"},{"issue":"1","key":"22_CR18","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1109\/JBHI.2014.2343154","volume":"19","author":"A Gr\u00fcnerbl","year":"2015","unstructured":"Gr\u00fcnerbl, A., et al.: Smartphone-based recognition of states and state changes in bipolar disorder patients. IEEE J. Biomed. Health Inform. 19(1), 140\u2013148 (2015). https:\/\/doi.org\/10.1109\/JBHI.2014.2343154","journal-title":"IEEE J. Biomed. Health Inform."},{"issue":"7","key":"22_CR19","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1002\/spe.1131","volume":"43","author":"M Hafiz","year":"2013","unstructured":"Hafiz, M.: A pattern language for developing privacy enhancing technologies. Softw. Pract. Exp. 43(7), 769\u2013787 (2013)","journal-title":"Softw. Pract. Exp."},{"key":"22_CR20","doi-asserted-by":"publisher","unstructured":"Hansen, M., Jensen, M., Rost, M.: Protection goals for privacy engineering. In: 2015 IEEE Security and Privacy Workshops, pp. 159\u2013166, May 2015. https:\/\/doi.org\/10.1109\/SPW.2015.13","DOI":"10.1109\/SPW.2015.13"},{"key":"22_CR21","unstructured":"H\u00e4rting, C., Markowitsch, H.J., Neufeld, H., Calabrese, P., Deisinger, K., Kessler, J.: Wechsler Ged\u00e4chtnistest - Revidierte Fassung: WMS-R (2000)"},{"key":"22_CR22","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1186\/s12916-015-0444-y","volume":"13","author":"K Huckvale","year":"2015","unstructured":"Huckvale, K., Prieto, J.T., Tilney, M., Benghozi, P.J., Car, J.: Unaddressed privacy risks in accredited health and wellness apps: a cross-sectional systematic assessment. BMC Med. 13, 214 (2015). https:\/\/doi.org\/10.1186\/s12916-015-0444-y","journal-title":"BMC Med."},{"key":"22_CR23","doi-asserted-by":"crossref","unstructured":"Karras, T., Laine, S., Aittala, M., Hellsten, J., Lehtinen, J., Aila, T.: Analyzing and improving the image quality of StyleGAN. In: The IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), June 2020","DOI":"10.1109\/CVPR42600.2020.00813"},{"issue":"6","key":"22_CR24","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/BF01530764","volume":"4","author":"TJ Kiresuk","year":"1968","unstructured":"Kiresuk, T.J., Sherman, R.E.: Goal attainment scaling: a general method for evaluating comprehensive community mental health programs. Community Mental Health J. 4(6), 443\u2013453 (1968). https:\/\/doi.org\/10.1007\/BF01530764","journal-title":"Community Mental Health J."},{"key":"22_CR25","doi-asserted-by":"publisher","unstructured":"Kleiman, E.M., et al.: Digital phenotyping of suicidal thoughts, July 2018. https:\/\/doi.org\/10.1002\/da.22730, https:\/\/onlinelibrary.wiley.com\/doi\/abs\/10.1002\/da.22730","DOI":"10.1002\/da.22730"},{"key":"22_CR26","doi-asserted-by":"publisher","unstructured":"Knorr, K., Aspinall, D.: Security testing for Android mHealth apps. In: 2015 IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW), pp. 1\u20138, April 2015. https:\/\/doi.org\/10.1109\/ICSTW.2015.7107459","DOI":"10.1109\/ICSTW.2015.7107459"},{"issue":"3","key":"22_CR27","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1017\/S1355617700633052","volume":"6","author":"B Levine","year":"2000","unstructured":"Levine, B., et al.: Rehabilitation of executive functioning: an experimental-clinical validation of goal management training. J. Int. Neuropsychol. Soc. 6(3), 299\u2013312 (2000). https:\/\/doi.org\/10.1017\/S1355617700633052","journal-title":"J. Int. Neuropsychol. Soc."},{"key":"22_CR28","doi-asserted-by":"publisher","unstructured":"Levine, B., et al.: Rehabilitation of executive functioning: an experimental-clinical validation of goal management training. J. Int. Neuropsychol. Soc. 6(3), 299\u2013312 (2000). https:\/\/doi.org\/10.1017\/S1355617700633052, https:\/\/www.cambridge.org\/core\/journals\/journal-of-the-international-neuropsychological-society\/article\/rehabilitation-of-executive-functioning-an-experimentalclinical-validation-of-goal-management-training\/79A6CAE70C3703008D083F64F34246D8","DOI":"10.1017\/S1355617700633052"},{"key":"22_CR29","doi-asserted-by":"publisher","unstructured":"Levine, B., et al.: Rehabilitation of executive functioning in patients with frontal lobe brain damage with goal management training. Front. Hum. Neurosci. 5 (2011). https:\/\/doi.org\/10.3389\/fnhum.2011.00009, https:\/\/www.frontiersin.org\/articles\/10.3389\/fnhum.2011.00009\/full","DOI":"10.3389\/fnhum.2011.00009"},{"key":"22_CR30","doi-asserted-by":"publisher","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-Closeness: privacy beyond k-anonymity and l-diversity. In: 2007 IEEE 23rd International Conference on Data Engineering, pp. 106\u2013115, April 2007. https:\/\/doi.org\/10.1109\/ICDE.2007.367856, ISSN 2375-026X","DOI":"10.1109\/ICDE.2007.367856"},{"key":"22_CR31","doi-asserted-by":"publisher","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1(1), 3-es (2007). https:\/\/doi.org\/10.1145\/1217299.1217302","DOI":"10.1145\/1217299.1217302"},{"issue":"1","key":"22_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-014-0181-3","volume":"39","author":"B Mart\u00ednez-P\u00e9rez","year":"2014","unstructured":"Mart\u00ednez-P\u00e9rez, B., de la Torre-D\u00edez, I., L\u00f3pez-Coronado, M.: Privacy and security in mobile health apps: a review and recommendations. J. Med. Syst. 39(1), 1\u20138 (2014). https:\/\/doi.org\/10.1007\/s10916-014-0181-3","journal-title":"J. Med. Syst."},{"key":"22_CR33","unstructured":"McMahan, B., Ramage, D., Talwar, K., Zhang, L.: Learning differentially private recurrent language models. In: International Conference on Learning Representations (ICLR) (2018). https:\/\/openreview.net\/pdf?id=BJ0hF1Z0b"},{"key":"22_CR34","doi-asserted-by":"publisher","first-page":"41","DOI":"10.3233\/978-1-61499-633-0-41","volume":"221","author":"A Mense","year":"2016","unstructured":"Mense, A., Steger, S., Sulek, M., Jukic-Sunaric, D., M\u00e9sz\u00e1ros, A.: Analyzing privacy risks of mHealth applications. Stud. Health Technol. Inform. 221, 41\u201345 (2016). https:\/\/doi.org\/10.3233\/978-1-61499-633-0-41","journal-title":"Stud. Health Technol. Inform."},{"key":"22_CR35","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1146\/annurev-clinpsy-032816-044949","volume":"13","author":"DL Mohr","year":"2017","unstructured":"Mohr, D.L., Zhang, M., Schueller, S.M.: Personal sensing: understanding mental health using ubiquitous sensors and machine learning. Annu. Rev. Clin. Psychol. 13, 23\u201347 (2017). https:\/\/doi.org\/10.1146\/annurev-clinpsy-032816-044949","journal-title":"Annu. Rev. Clin. Psychol."},{"key":"22_CR36","doi-asserted-by":"publisher","unstructured":"M\u00fcller, S.V., Ertas, F., Aust, J., Gabel, A., Schiering, I.: Kann eine mobile Anwendung helfen abzuwaschen? Zeitschrift f\u00fcr Neuropsychologie 30(2), 123\u2013131 (2019). https:\/\/doi.org\/10.1024\/1016-264X\/a000256","DOI":"10.1024\/1016-264X\/a000256"},{"key":"22_CR37","unstructured":"M\u00fcller, S.V.: St\u00f6rungen der Exekutivfunktionen. Hogrefe (2013)"},{"issue":"7","key":"22_CR38","doi-asserted-by":"publisher","first-page":"1691","DOI":"10.1038\/npp.2016.7","volume":"41","author":"JP Onnela","year":"2016","unstructured":"Onnela, J.P., Rauch, S.L.: Harnessing smartphone-based digital phenotyping to enhance behavioral and mental health. Neuropsychopharmacology 41(7), 1691\u20131696 (2016). https:\/\/doi.org\/10.1038\/npp.2016.7","journal-title":"Neuropsychopharmacology"},{"key":"22_CR39","doi-asserted-by":"publisher","first-page":"9390","DOI":"10.1109\/ACCESS.2018.2799522","volume":"6","author":"A Papageorgiou","year":"2018","unstructured":"Papageorgiou, A., Strigkos, M., Politou, E., Alepis, E., Solanas, A., Patsakis, C.: Security and privacy analysis of mobile health applications: the alarming state of practice. IEEE Access 6, 9390\u20139403 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2799522","journal-title":"IEEE Access"},{"key":"22_CR40","unstructured":"Reitan, R.: Trail-Making Test. Reitan Neuropsychology Laboratory, Arizona (1979)"},{"key":"22_CR41","unstructured":"Robertson, I.: Goal Management Training: A Clinical Manual. PsyConsult, Cambridge (1996)"},{"key":"22_CR42","doi-asserted-by":"publisher","unstructured":"Schneider, W., Shiffrin, R.M.: Controlled and automatic human information processing: I. Detection, search, and attention. Psychol. Rev. 84(1), 1\u201366 (1977). https:\/\/doi.org\/10.1037\/0033-295X.84.1.1","DOI":"10.1037\/0033-295X.84.1.1"},{"key":"22_CR43","doi-asserted-by":"publisher","unstructured":"Stamenova, V., Levine, B.: Effectiveness of goal management training\u00ae in improving executive functions: a meta-analysis. Neuropsychol. Rehabil., 1\u201331 (2018). https:\/\/doi.org\/10.1080\/09602011.2018.1438294","DOI":"10.1080\/09602011.2018.1438294"},{"key":"22_CR44","doi-asserted-by":"publisher","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl.-Based Syst. (2012). https:\/\/doi.org\/10.1142\/S0218488502001648, http:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218488502001648","DOI":"10.1142\/S0218488502001648"},{"issue":"3 & 4","key":"22_CR45","first-page":"2016","volume":"9","author":"C Treacy","year":"2016","unstructured":"Treacy, C., McCaffery, F.: Data security overview for medical mobile apps. Int. J. Adv. Secur. 9(3 & 4), 2016 (2016)","journal-title":"Int. J. Adv. Secur."},{"key":"22_CR46","unstructured":"Tucha, O., Lange, K.W.: TL-D: Turm von London - Deutsche Version (2004)"},{"key":"22_CR47","volume-title":"Behavioural Assessment of the Dysexecutive Syndrome","author":"BA Wilson","year":"1996","unstructured":"Wilson, B.A., Alderman, N., Burgess, P.W., Emslie, H., Evans, J.J.: Behavioural Assessment of the Dysexecutive Syndrome. Harcourt Assessment, San Antonio (1996)"},{"key":"22_CR48","unstructured":"Zimmermann, P., Fimm, B.: TAP Testbatterie zur Aufmerksamkeitspr\u00fcfung. Vera Fimm, Psychologische Testsysteme (2017)"}],"container-title":["Communications in Computer and Information Science","Biomedical Engineering Systems and Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-72379-8_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,29]],"date-time":"2021-03-29T19:27:06Z","timestamp":1617046026000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-72379-8_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030723781","9783030723798"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-72379-8_22","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"30 March 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BIOSTEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Joint Conference on Biomedical Engineering Systems and Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Valetta","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malta","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 February 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 February 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"biostec2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.biostec.org\/?y=2020","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"PRIMORIS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"363","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}