{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T17:20:31Z","timestamp":1772126431260,"version":"3.50.1"},"publisher-location":"Cham","reference-count":64,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030766627","type":"print"},{"value":"9783030766634","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-76663-4_3","type":"book-chapter","created":{"date-parts":[[2021,5,18]],"date-time":"2021-05-18T08:03:46Z","timestamp":1621325026000},"page":"47-69","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Consent Management Platforms Under the GDPR: Processors and\/or Controllers?"],"prefix":"10.1007","author":[{"given":"Cristiana","family":"Santos","sequence":"first","affiliation":[]},{"given":"Midas","family":"Nouwens","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Toth","sequence":"additional","affiliation":[]},{"given":"Nataliia","family":"Bielova","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Roca","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,19]]},"reference":[{"key":"3_CR1","unstructured":"Deceived by design: How tech companies use dark patterns to discourage us from exercising our rights to privacy (2018). https:\/\/www.forbrukerradet.no\/undersokelse\/no-undersokelsekategori\/deceived-by-design"},{"key":"3_CR2","unstructured":"Working Party: Opinion 1\/2010 on the concepts of \u201ccontroller\u201d and \u201cprocessor\u201d WP 169 (2010). https:\/\/ec.europa.eu\/justice\/article-29\/documentation\/opinion-recommendation\/files\/2010\/wp169_en.pdf"},{"key":"3_CR3","unstructured":"Advocate General Mengozzi: Opinion of Advocate General Mengozziin Jehovah\u2019s witnesses, C-25\/17, ECLI:EU:C:2018:57, paragraph 68 (2018)"},{"key":"3_CR4","unstructured":"Agencia Espa\u00f1ola de Protecci\u00f3n de Datos (Spanish DPA): Guide on use of cookies (2021). https:\/\/www.aepd.es\/sites\/default\/files\/2021-01\/guia-cookies-en.pdf"},{"key":"3_CR5","unstructured":"Article 29 Working Party: Opinion 2\/2010 on online behavioural advertising (WP 171) (2010). https:\/\/ec.europa.eu\/justice\/article-29\/documentation\/opinion-recommendation\/files\/2010\/wp171_en.pdf"},{"key":"3_CR6","unstructured":"Bielova, N., Santos, C.: Call for Feedback to the EDPB regarding Guidelines 07\/2020 on the concepts of controller and processor in the IAB Europe Transparency and Consent Framework (2020). http:\/\/www-sop.inria.fr\/members\/Nataliia.Bielova\/opinions\/EDPB-contribution-controllers-processors.pdf"},{"key":"3_CR7","unstructured":"Commission Nationale de l\u2019Informatique et des Libert\u00e9s (CNIL): Shaping Choices in the Digital World (2019). https:\/\/linc.cnil.fr\/sites\/default\/files\/atoms\/files\/cnil_ip_report_06_shaping_choices_in_the_digital_world.pdf"},{"key":"3_CR8","unstructured":"Commission Nationale de l\u2019Informatique et des Libert\u00e9s (French DPA): French guidelines on cookies: Deliberation No 2020\u2013091 of September 17, 2020 adopting guidelines relating to the application of article 82 of the law of January 6, 1978 amended to read and write operations in a user\u2019s terminal (in particular to \u201ccookies and other tracers\u201d) (2020). https:\/\/www.legifrance.gouv.fr\/jorf\/id\/JORFTEXT000042388179"},{"key":"3_CR9","unstructured":"Cookiebot: Cookie scanner - revealer of hidden tracking, September 2020. https:\/\/www.cookiebot.com\/en\/cookie-scanner\/"},{"key":"3_CR10","unstructured":"Cookiepedia Official website. https:\/\/cookiepedia.co.uk\/"},{"key":"3_CR11","unstructured":"CookiePro: Lesson 3: Scan Results and Categorizing Cookies, July 2020). https:\/\/community.cookiepro.com\/s\/article\/UUID-309d4544-c927-fe00-da50-60ed7668c6b5"},{"key":"3_CR12","unstructured":"CookiePro: Scanning a Website, November 2020. https:\/\/community.cookiepro.com\/s\/article\/UUID-621498be-7e5c-23af-3bfd-e772340b4933"},{"key":"3_CR13","unstructured":"CookiePro by OneTrust: CookiePro Free IAB TCF 2.0 CMP Builder (nd). https:\/\/www.cookiepro.com\/iab-tcf-2-builder\/"},{"key":"3_CR14","unstructured":"Court of Justice of the European Union: Case 582\/14 - Patrick Breyer v Germany (2016). ECLI:EU:C:2016:779"},{"key":"3_CR15","unstructured":"Crownpeak: Vendor categories (nd). https:\/\/community.crownpeak.com\/t5\/Universal-Consent-Platform-UCP\/Vendor-Categories\/ta-p\/665"},{"key":"3_CR16","unstructured":"Danish DPA (Datatilsynet): Guide on consent (2019). www.datatilsynet.dk\/media\/6562\/samtykke.pdf"},{"key":"3_CR17","unstructured":"Data Protection Commission (Irish DPA): Guidance note on the use of cookies and other tracking technologies (2020). https:\/\/www.dataprotection.ie\/sites\/default\/files\/uploads\/2020-04\/Guidance%20note%20on%20cookies%20and%20other%20tracking%20technologies.pdf"},{"key":"3_CR18","unstructured":"Data Protection Commission (Irish DPA): Report by the DPC on the Use of Cookies and Other Tracking Technologies (2020). https:\/\/www.dataprotection.ie\/en\/news-media\/press-releases\/report-dpc-use-cookies-and-other-tracking-technologies"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Degeling, M., Utz, C., Lentzsch, C., Hosseini, H., Schaub, F., Holz, T.: We value your privacy ... now take some cookies: measuring the GDPR\u2019s impact on web privacy. In: Network and Distributed Systems Security Symposium (2019)","DOI":"10.14722\/ndss.2019.23378"},{"key":"3_CR20","unstructured":"Directive 2009\/136\/EC of the European Parliament and of the Council of 25 November 2009. https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=celex%3A32009L0136. Accessed 31 Oct 2019"},{"key":"3_CR21","unstructured":"Europe, I: Transparency and consent string with global vendor & CMP list formats (final vol 2.0): About the transparency & consent string (TC String) (2020). https:\/\/github.com\/InteractiveAdvertisingBureau\/GDPR-Transparency-and-Consent-Framework\/blob\/master\/TCFv2\/IAB%20Tech%20Lab%20-%20Consent%20string%20and%20vendor%20list%20formats%20v2.md#about-the-transparency-consent-string-tc-string. Accessed 14 Jan 2021"},{"key":"3_CR22","unstructured":"European Court of Justice: Case 25\/17 Jehovan todistajat, ECLI:EU:C:2018:551"},{"key":"3_CR23","unstructured":"European Court of Justice: Case C-40\/17 Fashion ID GmbH & Co.KG v Verbraucherzentrale NRW eV, ECLI:EU:C:2019:629"},{"key":"3_CR24","unstructured":"European Court of Justice: Case C-210\/16 Wirtschaftsakademie Schleswig-Holstein, ECLI:EU:C:2018:388"},{"key":"3_CR25","unstructured":"European Data Protection Board: Guidelines 05\/2020 on consent, Version 1.1 (2020). https:\/\/edpb.europa.eu\/sites\/edpb\/files\/files\/file1\/edpb_guidelines_202005_consent_en.pdf. Accessed 4 May 2020"},{"key":"3_CR26","unstructured":"European Data Protection Board: Guidelines 07\/2020 on the concepts of controller and processor in the GDPR Version 1.0 (2020). https:\/\/edpb.europa.eu\/our-work-tools\/public-consultations-art-704\/2020\/guidelines-072020-concepts-controller-and-processor_en"},{"key":"3_CR27","unstructured":"Evidon: Quantcast-related pages on Evidon Company Directory (2017). https:\/\/info.evidon.com\/companies?q=Quantcast. Consulted 8 Jan 2021"},{"key":"3_CR28","doi-asserted-by":"crossref","unstructured":"Finck, M., Pallas, F.: They who must not be identified - distinguishing personal from non-personal data under the GDPR. Int. Data Priv. Law 10 (2020)","DOI":"10.2139\/ssrn.3462948"},{"key":"3_CR29","doi-asserted-by":"publisher","unstructured":"Fouad, I., Bielova, N., Legout, A., Sarafijanovic-Djukic, N.: Missed by filter lists: detecting unknown third-party trackers with invisible pixels. In: Proceedings on Privacy Enhancing Technologies (PoPETs) (2020). Published online 08 May 2020, https:\/\/doi.org\/10.2478\/popets-2020-0038","DOI":"10.2478\/popets-2020-0038"},{"key":"3_CR30","doi-asserted-by":"crossref","unstructured":"Fouad, I., Santos, C., Al Kassar, F., Bielova, N., Calzavara, S.: On compliance of cookie purposes with the purpose specification principle. In: 2020 International Workshop on Privacy Engineering, IWPE (2020). https:\/\/hal.inria.fr\/hal-02567022","DOI":"10.1109\/EuroSPW51379.2020.00051"},{"key":"3_CR31","unstructured":"Regulation (EU) 2016\/679 of the European parliament and of the council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/46\/EC (general data protection regulation) (text with EEA relevance). https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=celex:32016R0679"},{"key":"3_CR32","doi-asserted-by":"crossref","unstructured":"Gray, C.M., Kou, Y., Battles, B., Hoggatt, J., Toombs, A.L.: The dark (patterns) side of UX design. In: Proceedings of the CHI Conference Human Factors in Computing Systems, p. 534 (2018)","DOI":"10.1145\/3173574.3174108"},{"key":"3_CR33","doi-asserted-by":"crossref","unstructured":"Gray, C.M., Santos, C., Bielova, N., Toth, M., Clifford, D.: Dark patterns and the legal requirements of consent banners: an interaction criticism perspective. In: ACM CHI 2021 (2020). https:\/\/arxiv.org\/abs\/2009.10194","DOI":"10.1145\/3411764.3445779"},{"key":"3_CR34","unstructured":"Greek DPA (HDPA): Guidelines on Cookies and Trackers (2020). http:\/\/www.dpa.gr\/APDPXPortlets\/htdocs\/documentSDisplay.jsp?docid=84,221,176,170,98,24,72,223"},{"key":"3_CR35","doi-asserted-by":"crossref","unstructured":"Hils, M., Woods, D.W., B\u00f6hme, R.: Measuring the emergence of consent management on the web. In: ACM Internet Measurement Conference (IMC 2020) (2020)","DOI":"10.1145\/3419394.3423647"},{"key":"3_CR36","doi-asserted-by":"crossref","unstructured":"Hintze, M.: Data controllers, data processors, and the growing use of connected products in the enterprise: managing risks, understanding benefits, and complying with the GDPR. Cybersecurity (2018)","DOI":"10.2139\/ssrn.3192721"},{"key":"3_CR37","unstructured":"IAB Europe: Transparency and Consent String with Global Vendor and CMP List Formats (Final vol 2.0) (2019). https:\/\/github.com\/InteractiveAdvertisingBureau\/GDPR-Transparency-and-Consent-Framework\/blob\/master\/TCFv2\/IABTechLab-Consentstringandvendorlistformatsv2.md. Accessed 12 Feb 2021"},{"key":"3_CR38","unstructured":"IAB Europe: IAB Europe Transparency & Consent Framework Policies (2020). https:\/\/iabeurope.eu\/wp-content\/uploads\/2020\/11\/TCF_v2-0_Policy_version_2020-11-18-3.2a.docx-1.pdf"},{"key":"3_CR39","unstructured":"IAB Europe: Vendor List TCF v2.0 (2020). https:\/\/iabeurope.eu\/vendor-list-tcf-v2-0\/"},{"key":"3_CR40","unstructured":"Information Commissioner\u2019s Office: Data controllers and data processors: what the difference is and what the governance implications are (2018). https:\/\/ico.org.uk\/for-organisations\/guide-to-data-protection\/guide-to-the-general-data-protection-regulation-gdpr\/controllers-and-processors\/"},{"key":"3_CR41","unstructured":"Information Commissioner\u2019s Office: Guidance on the use of cookies and similar technologies (2019). https:\/\/ico.org.uk\/media\/for-organisations\/guide-to-pecr\/guidance-on-the-use-of-cookies-and-similar-technologies-1-0.pdf"},{"key":"3_CR42","unstructured":"Jared Spool: Do users change their settings? (2011). https:\/\/archive.uie.com\/brainsparks\/2011\/09\/14\/do-users-change-their-settings\/"},{"key":"3_CR43","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1015044207315","volume":"13","author":"EJ Johnson","year":"2002","unstructured":"Johnson, E.J., Bellman, S., Lohse, G.L.: Defaults, framing and privacy: why opting in-opting out. Mark. Lett. 13, 5\u201315 (2002)","journal-title":"Mark. Lett."},{"key":"3_CR44","doi-asserted-by":"publisher","first-page":"1338","DOI":"10.1126\/science.1091721","volume":"302","author":"EJ Johnson","year":"2003","unstructured":"Johnson, E.J., Goldstein, D.G.: Do defaults save lives? Science 302, 1338\u20131339 (2003)","journal-title":"Science"},{"key":"3_CR45","doi-asserted-by":"crossref","unstructured":"Machuletz, D., B\u00f6hme, R.: Multiple purposes, multiple problems: a user study of consent dialogs after GDPR. In: Proceedings on Privacy Enhancing Technologies (PoPETs), pp. 481\u2013498 (2020)","DOI":"10.2478\/popets-2020-0037"},{"key":"3_CR46","doi-asserted-by":"crossref","unstructured":"Maier, G., Feldmann, A., Paxson, V., Allman, M.: On dominant characteristics of residential broadband internet traffic. In: Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement Conference, pp. 90\u2013102 (2009)","DOI":"10.1145\/1644893.1644904"},{"key":"3_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-030-55196-4_10","volume-title":"Privacy Technologies and Policy","author":"C Matte","year":"2020","unstructured":"Matte, C., Santos, C., Bielova, N.: Purposes in IAB Europe\u2019s TCF: which legal basis and how are they used by advertisers? In: Antunes, L., Naldi, M., Italiano, G.F., Rannenberg, K., Drogkaris, P. (eds.) APF 2020. LNCS, vol. 12121, pp. 163\u2013185. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-55196-4_10. https:\/\/hal.inria.fr\/hal-02566891"},{"key":"3_CR48","doi-asserted-by":"crossref","unstructured":"Matte, C., Bielova, N., Santos, C.: Do cookie banners respect my choice? Measuring legal compliance of banners from IAB Europe\u2019s transparency and consent framework. In: IEEE Symposium on Security and Privacy (IEEE S&P 2020) (2020)","DOI":"10.1109\/SP40000.2020.00076"},{"key":"3_CR49","doi-asserted-by":"publisher","unstructured":"Mishra, V., Laperdrix, P., Vastel, A., Rudametkin, W., Rouvoy, R., Lopatka, M.: Don\u2019t count me out: on the relevance of IP address in the tracking ecosystem. In: Huang, Y., King, I., Liu, T., van Steen, M. (eds.) WWW 2020: The Web Conference 2020, Taipei, Taiwan, 20\u201324 April 2020, pp. 808\u2013815. ACM\/IW3C2 (2020). https:\/\/doi.org\/10.1145\/3366423.3380161","DOI":"10.1145\/3366423.3380161"},{"key":"3_CR50","doi-asserted-by":"crossref","unstructured":"Nouwens, M., Liccardi, I., Veale, M., Karger, D., Kagal, L.: Dark patterns after the GDPR: scraping consent pop-ups and demonstrating their influence. In: CHI (2020)","DOI":"10.1145\/3313831.3376321"},{"key":"3_CR51","unstructured":"OneTrust PreferenceChoice: Consent management platform (CMP). https:\/\/www.preferencechoice.com\/consent-management-platform\/. Accessed 20 Jan 2021"},{"key":"3_CR52","doi-asserted-by":"crossref","unstructured":"Pawlata, H., Caki, G.: The impact of the transparency consent framework on current programmatic advertising practices. In: 4th International Conference on Computer-Human Interaction Research and Applications (2020)","DOI":"10.5220\/0010214603310336"},{"key":"3_CR53","unstructured":"Quantcast: Quantcast Choice (2020). https:\/\/www.quantcast.com\/products\/choice-consent-management-platform\/"},{"key":"3_CR54","unstructured":"Quantcast: Quantcast Choice - User Guide (2020). https:\/\/help.quantcast.com\/hc\/en-us\/articles\/360052725133-Quantcast-Choice-User-Guide"},{"key":"3_CR55","unstructured":"Quantcast: Quantcast Choice Terms of Service (2020). https:\/\/www.quantcast.com\/legal\/quantcast-choice-terms-of-service\/"},{"key":"3_CR56","unstructured":"Quantcast: Quantcast Measure and Q for Publishers Terms of Service (2020). https:\/\/www.quantcast.com\/legal\/measure-terms-service\/"},{"key":"3_CR57","unstructured":"Quantcast: Quantcast Privacy Policy (2020). https:\/\/www.quantcast.com\/privacy"},{"key":"3_CR58","unstructured":"Quantcast: Quantcast Choice - Universal Tag Implementation Guide (TCF v2) (2021). https:\/\/help.quantcast.com\/hc\/en-us\/articles\/360052746173-Quantcast-Choice-Universal-Tag-Implementation-Guide-TCF-v2-"},{"key":"3_CR59","unstructured":"Quantcast: Quantcast Measure (2021). https:\/\/www.quantcast.com\/products\/measure-audience-insights\/"},{"key":"3_CR60","doi-asserted-by":"publisher","unstructured":"Santos, C., Bielova, N., Matte, C.: Are cookie banners indeed compliant with the law? Deciphering EU legal requirements on consent and technical means to verify compliance of cookie banners. Technol. Regul. 91\u2013135 (2020). https:\/\/doi.org\/10.26116\/techreg.2020.009","DOI":"10.26116\/techreg.2020.009"},{"key":"3_CR61","unstructured":"Signatu: Trackerdetect (nd). https:\/\/signatu.com\/product\/trackerdetect\/"},{"key":"3_CR62","unstructured":"Thaler, R.H., Sunstein, C.R.: Nudge: Improving Decisions About Health, Wealth, and Happiness. Yale University Press (2008)"},{"key":"3_CR63","unstructured":"TrustArc: Cookie Consent Manager (nd). https:\/\/trustarc.com\/cookie-consent-manager\/"},{"key":"3_CR64","doi-asserted-by":"crossref","unstructured":"Utz, C., Degeling, M., Fahl, S., Schaub, F., Holz, T.: (Un)informed consent: studying GDPR consent notices in the field. In: Conference on Computer and Communications Security (2019)","DOI":"10.1145\/3319535.3354212"}],"container-title":["Lecture Notes in Computer Science","Privacy Technologies and Policy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-76663-4_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,26]],"date-time":"2021-05-26T23:18:14Z","timestamp":1622071094000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-76663-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030766627","9783030766634"],"references-count":64,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-76663-4_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"19 May 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"APF","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Annual Privacy Forum","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 June 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 June 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"apf2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/privacyforum.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Virtual Event","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}