{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T04:22:04Z","timestamp":1751516524364,"version":"3.41.0"},"publisher-location":"Cham","reference-count":65,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030773915"},{"type":"electronic","value":"9783030773922"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-77392-2_26","type":"book-chapter","created":{"date-parts":[[2021,7,2]],"date-time":"2021-07-02T23:06:05Z","timestamp":1625267165000},"page":"403-416","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Help the User Recognize a Phishing Scam: Design of Explanation Messages in Warning Interfaces for Phishing Attacks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9544-8972","authenticated-orcid":false,"given":"Joseph","family":"Aneke","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8993-9855","authenticated-orcid":false,"given":"Carmelo","family":"Ardito","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9894-2116","authenticated-orcid":false,"given":"Giuseppe","family":"Desolda","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,3]]},"reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"Brynjolfsson, E., Horton, J.J., Ozimek, A., Rock, D., Sharma, G., TuYe, H.-Y.: COVID-19 and remote work: an early look at US data, pp. 0898\u20132937. National Bureau of Economic Research (2020)","DOI":"10.3386\/w27344"},{"key":"26_CR2","unstructured":"Wiggen, J.: The impact of COVID-19 on cyber crime and state-sponsored cyber activities (2020)"},{"key":"26_CR3","unstructured":"Bott, E.: How many people still run windows 7. https:\/\/www.zdnet.com\/article\/as-support-ends-windows-7-users-head-for-the-exits\/. Accessed 28 Oct 2020"},{"key":"26_CR4","unstructured":"Gallagher, S., Brandt, A.: Facing down the myriad threats tied to COVID19 (2020). https:\/\/news.sophos.com\/enus\/2020\/04\/14\/covidmalware. Accessed 28 Oct 2020"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 581\u2013590 (2006)","DOI":"10.1145\/1124772.1124861"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Friedman, B., Hurley, D., Howe, D.C., Felten, E., Nissenbaum, H.: Users\u2019 conceptions of web security: a comparative study. In: CHI 2002 Extended Abstracts On Human Factors in Computing Systems, pp. 746\u2013747 (2002)","DOI":"10.1145\/506443.506577"},{"key":"26_CR7","unstructured":"Bravo-Lillo, C., Cranor, L., Komanduri, S., Schechter, S., Sleeper, M.: Harder to ignore? Revisiting pop-up fatigue and approaches to prevent it. In: 10th Symposium On Usable Privacy and Security (SOUPS 2014), pp. 105\u2013111 (2014)"},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Jackson, C., Simon, D.R., Tan, D.S., Barth, A.: An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks. In: Financial Cryptography and Data Security, Berlin, Heidelberg, pp. 281\u2013293 (2007)","DOI":"10.1007\/978-3-540-77366-5_27"},{"key":"26_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/978-3-030-22351-9_9","volume-title":"HCI for Cybersecurity, Privacy and Trust","author":"G Desolda","year":"2019","unstructured":"Desolda, G., Di Nocera, F., Ferro, L., Lanzilotti, R., Maggi, P., Marrella, A.: Alerting users about phishing attacks. In: Moallem, Abbas (ed.) HCII 2019. LNCS, vol. 11594, pp. 134\u2013148. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-22351-9_9"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Aneke, J., Ardito, C., Desolda, G.: Designing an intelligent user interface for preventing phishing attacks. In: IFIP Conference on Human-Computer Interaction, pp. 97\u2013106 (2019)","DOI":"10.1007\/978-3-030-46540-7_10"},{"key":"26_CR11","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.ijhcs.2015.05.005","volume":"82","author":"M Alsharnouby","year":"2015","unstructured":"Alsharnouby, M., Alaca, F., Chiasson, S.: Why phishing still works: user strategies for combating phishing attacks. Int. J. Human-Comput. Stud. 82, 69\u201382 (2015)","journal-title":"Int. J. Human-Comput. Stud."},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Harbach, M., Fahl, S., Yakovleva, P., Smith, M.: Sorry, i don\u2019t get it: an analysis of warning message texts. In: International Conference on Financial Cryptography and Data Security, pp. 94\u2013111 (2013)","DOI":"10.1007\/978-3-642-41320-9_7"},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Greenwald, S.J., Olthoff, K.G., Raskin, V., Ruch, W.: The user non-acceptance paradigm: INFOSEC\u2019s dirty little secret. In: Proceedings of the 2004 Workshop on New Security Paradigms, pp. 35\u201343 (2004)","DOI":"10.1145\/1065907.1066032"},{"key":"26_CR14","unstructured":"Kumaran, N., Lugani, S.: Protecting businesses against cyber threats during COVID-19 and beyond. Google Cloud, vol. 16 (2020)"},{"key":"26_CR15","doi-asserted-by":"publisher","first-page":"e23692","DOI":"10.2196\/23692","volume":"22","author":"CM Williams","year":"2020","unstructured":"Williams, C.M., Chaturvedi, R., Chakravarthy, K.: Cybersecurity risks in a pandemic. J. Med. Internet Res. 22, e23692 (2020)","journal-title":"J. Med. Internet Res."},{"key":"26_CR16","doi-asserted-by":"publisher","DOI":"10.1201\/9781482289688","volume-title":"Handbook of Warnings","author":"MS Wogalter","year":"2006","unstructured":"Wogalter, M.S.: Handbook of Warnings. CRC Press, Boca Raton (2006)"},{"key":"26_CR17","volume-title":"Warnings and Risk Communication","author":"K Laughery","year":"1999","unstructured":"Laughery, K., DeJoy, D., Wogalter, M.: Warnings and Risk Communication. Taylor and Francis, Philadelphia (1999)"},{"key":"26_CR18","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/S0003-6870(02)00009-1","volume":"33","author":"MS Wogalter","year":"2002","unstructured":"Wogalter, M.S., Conzola, V.C., Smith-Jackson, T.L.: Research-based guidelines for warning design and evaluation. Appl. Ergon. 33, 219\u2013230 (2002)","journal-title":"Appl. Ergon."},{"key":"26_CR19","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/1330311.1330320","volume":"51","author":"R West","year":"2008","unstructured":"West, R.: The psychology of security. Commun. ACM 51, 34\u201340 (2008)","journal-title":"Commun. ACM"},{"key":"26_CR20","doi-asserted-by":"crossref","unstructured":"Kumaraguru, P., et al.: Getting users to pay attention to anti-phishing education: evaluation of retention and transfer. In: Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit, pp. 70\u201381 (2007)","DOI":"10.1145\/1299015.1299022"},{"key":"26_CR21","doi-asserted-by":"crossref","unstructured":"De Paula, R., et al.: Two experiences designing for effective security. In: Proceedings of the 2005 Symposium on Usable Privacy and Security, pp. 25\u201334 (2005)","DOI":"10.1145\/1073001.1073004"},{"key":"26_CR22","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: User attention, comprehension, and behavior. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1\u201314 (2012)","DOI":"10.1145\/2335356.2335360"},{"key":"26_CR23","unstructured":"Wash, R., Rader, E., Vaniea, K., Rizor, M.: Out of the loop: how automated software updates cause unintended security consequences. In: 10th Symposium On Usable Privacy and Security ({SOUPS} 2014), pp. 89\u2013104 (2014)"},{"key":"26_CR24","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MSP.2010.198","volume":"9","author":"C Bravo-Lillo","year":"2011","unstructured":"Bravo-Lillo, C., Cranor, L.F., Downs, J., Komanduri, S.: Bridging the gap in computer security warnings: a mental model approach. IEEE Secur. Priv. 9, 18\u201326 (2011)","journal-title":"IEEE Secur. Priv."},{"key":"26_CR25","unstructured":"Fagan, M., Khan, M.M.H.: Why do they do what they do? A study of what motivates users to (not) follow computer security advice. In: Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), pp. 59\u201375 (2016)"},{"key":"26_CR26","unstructured":"Almuhimedi, H., Felt, A.P., Reeder, R.W., Consolvo, S.: Your reputation precedes you: History, reputation, and the chrome malware warning. In: 10th Symposium on Usable Privacy and Security (SOUPS 2014), pp. 113\u2013128 (2014)"},{"issue":"3","key":"26_CR27","first-page":"64","volume":"11","author":"SM Gainsbury","year":"2015","unstructured":"Gainsbury, S.M., Russell, A., Gainsbury, S., Aro, D., Ball, D., Tobar, C.: Optimal content for warning messages to enhance consumer decision making and reduce problem gambling. Knowl. Educ. Law Manage. 11(3), 64\u201380 (2015)","journal-title":"Knowl. Educ. Law Manage."},{"key":"26_CR28","first-page":"41","volume":"51","author":"JD Shropshire","year":"2010","unstructured":"Shropshire, J.D., Warkentin, M., Johnston, A.C.: Impact of negative message framing on security adoption. J. Comput. Inf. Syst. 51, 41\u201351 (2010)","journal-title":"J. Comput. Inf. Syst."},{"key":"26_CR29","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1080\/03637759209376276","volume":"59","author":"K Witte","year":"1992","unstructured":"Witte, K.: Putting the fear back into fear appeals: the extended parallel process model. Commun. Monogr. 59, 329\u2013349 (1992)","journal-title":"Commun. Monogr."},{"key":"26_CR30","doi-asserted-by":"crossref","unstructured":"Egelman, S., Cranor, L.F., Hong, J.: You\u2019ve been warned: an empirical study of the effectiveness of web browser phishing warnings (2008)","DOI":"10.1145\/1357054.1357219"},{"key":"26_CR31","unstructured":"Sunshine, J., Egelman, S., Almuhimedi, H., Atri, N., Cranor, L.F.: Crying wolf: an empirical study of SSL warning effectiveness. In: USENIX Security Symposium, pp. 399\u2013416 (2009)"},{"key":"26_CR32","doi-asserted-by":"crossref","unstructured":"Bravo-Lillo, C., Cranor, L.F., Downs, J., Komanduri, S., Sleeper, M.: Improving computer security dialogs. In: IFIP Conference on Human-Computer Interaction, pp. 18\u201335 (2011)","DOI":"10.1007\/978-3-642-23768-3_2"},{"key":"26_CR33","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1016\/j.cose.2005.04.003","volume":"24","author":"S Furnell","year":"2005","unstructured":"Furnell, S.: Why users cannot use security. Comput. Secur. 24, 274\u2013279 (2005)","journal-title":"Comput. Secur."},{"key":"26_CR34","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.cose.2008.09.007","volume":"28","author":"A Herzberg","year":"2009","unstructured":"Herzberg, A.: Why Johnny can\u2019t surf (safely)? Attacks and defenses for web users. Comput. Secur. 28, 63\u201371 (2009)","journal-title":"Comput. Secur."},{"key":"26_CR35","series-title":"Understanding Complex Systems","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-319-43639-5_7","volume-title":"Cyberemotions","author":"M Thelwall","year":"2017","unstructured":"Thelwall, M.: The heart and soul of the web? Sentiment strength detection in the social web with sentistrength. In: Ho\u0142yst, J.A. (ed.) Cyberemotions. UCS, pp. 119\u2013134. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-43639-5_7"},{"key":"26_CR36","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-319-55394-8_4","volume-title":"A Practical Guide to Sentiment Analysis","author":"SM Mohammad","year":"2017","unstructured":"Mohammad, S.M.: Challenges in sentiment analysis. In: Cambria, E., Das, D., Bandyopadhyay, S., Feraco, A. (eds.) A Practical Guide to Sentiment Analysis, pp. 61\u201383. Springer, New York (2017). https:\/\/doi.org\/10.1007\/978-3-319-55394-8_4"},{"key":"26_CR37","doi-asserted-by":"publisher","first-page":"723","DOI":"10.1613\/jair.4272","volume":"50","author":"S Kiritchenko","year":"2014","unstructured":"Kiritchenko, S., Zhu, X., Mohammad, S.M.: Sentiment analysis of short informal texts. J. Artif. Intell. Res. 50, 723\u2013762 (2014)","journal-title":"J. Artif. Intell. Res."},{"key":"26_CR38","unstructured":"Bellegarda, J.R.: Emotion analysis using latent affective folding and embedding. In: Proceedings of the NAACL HLT 2010 Workshop on Computational Approaches to Analysis and Generation of Emotion in Text, pp. 1\u20139 (2010)"},{"key":"26_CR39","unstructured":"Boucouvalas, A.C.: Real time text-to-emotion engine for expressive internet communications. In: Proceedings of International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP-2002) (2002)"},{"key":"26_CR40","doi-asserted-by":"crossref","unstructured":"Francisco, V., Gerv\u00e1s, P.: Automated mark up of affective information in english texts. In: International Conference on Text, Speech and Dialogue, pp. 375\u2013382 (2006)","DOI":"10.1007\/11846406_47"},{"key":"26_CR41","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1016\/B978-0-08-100508-8.00009-6","volume-title":"Emotion measurement","author":"SM Mohammad","year":"2016","unstructured":"Mohammad, S.M.: Sentiment analysis: Detecting valence, emotions, and other affectual states from text. In: Meiselman, H.L. (ed.) Emotion measurement, pp. 201\u2013237. Elsevier, Duxford (2016)"},{"key":"26_CR42","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/978-1-4614-3223-4_13","volume-title":"Mining Text Data","author":"B Liu","year":"2017","unstructured":"Liu, B., Zhang, L.: A survey of opinion mining and sentiment analysis. In: Aggarwal, C., Zhai, C. (eds.) Mining Text Data, pp. 415\u2013463. Springer, Boston (2017). https:\/\/doi.org\/10.1007\/978-1-4614-3223-4_13"},{"key":"26_CR43","doi-asserted-by":"crossref","unstructured":"Pang, B., Lee, L.: Opinion mining and sentiment analysis. In: Foundations and Trends\u00ae in Information Retrieval, vol. 2, pp. 1\u2013135 (2008)","DOI":"10.1561\/1500000011"},{"key":"26_CR44","doi-asserted-by":"crossref","unstructured":"Biondi, G., Franzoni, V., Poggioni, V.: A deep learning semantic approach to emotion recognition using the IBM watson bluemix alchemy language. In: International Conference on Computational Science and Its Applications, pp. 718\u2013729 (2017)","DOI":"10.1007\/978-3-319-62398-6_51"},{"key":"26_CR45","first-page":"17","volume":"31","author":"C Whaley","year":"2005","unstructured":"Whaley, C.: Security companies might be messing with IT managers\u2019 minds. Comput. Can. 31, 17 (2005)","journal-title":"Comput. Can."},{"key":"26_CR46","doi-asserted-by":"publisher","first-page":"549","DOI":"10.2307\/25750691","volume":"34","author":"AC Johnston","year":"2010","unstructured":"Johnston, A.C.: Fear appeals and information security behaviours: an empirical study. MIS Q. 34, 549\u2013566 (2010)","journal-title":"MIS Q."},{"key":"26_CR47","unstructured":"Richards, J.C., Platt, J., Platt, H.: Longman Dictionary of Language Teaching Applied Linguistics, vol. 288 (1992)"},{"key":"26_CR48","doi-asserted-by":"publisher","first-page":"43","DOI":"10.4304\/tpls.2.1.43-53","volume":"2","author":"M Zamanian","year":"2012","unstructured":"Zamanian, M., Heydari, P.: Readability of Texts: State of the Art. Theor. Pract. Lang. Stud. 2, 43\u201353 (2012)","journal-title":"Theor. Pract. Lang. Stud."},{"key":"26_CR49","first-page":"19","volume":"26","author":"E Dale","year":"1949","unstructured":"Dale, E., Chall, J.S.: The concept of readability. Elementary Engl. 26, 19\u201326 (1949)","journal-title":"Elementary Engl."},{"key":"26_CR50","unstructured":"Gee, J.P.: Three paradigms in reading (really literacy) research and digital media. In: Reading at a Crossroads? Disjunctures and Continuities in Current Conceptions and Practices, vol. 35 (2015)"},{"key":"26_CR51","doi-asserted-by":"crossref","unstructured":"Paris, S.G., Stahl, S.A.: Children\u2019s reading comprehension and assessment. Routledge (2005)","DOI":"10.4324\/9781410612762"},{"key":"26_CR52","unstructured":"Cranor, L.F.: A framework for reasoning about the human in the loop (2008)"},{"key":"26_CR53","unstructured":"DuBay, W.H.: The Principles of Readability. In: Online Submission (2004)"},{"key":"26_CR54","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1037\/h0057532","volume":"32","author":"R Flesch","year":"1948","unstructured":"Flesch, R.: A new readability yardstick. J. Appl. Psychol. 32, 221 (1948)","journal-title":"J. Appl. Psychol."},{"key":"26_CR55","first-page":"639","volume":"12","author":"GH Mc Laughlin","year":"1969","unstructured":"Mc Laughlin, G.H.: SMOG grading-a new readability formula. J. Read. 12, 639\u2013646 (1969)","journal-title":"J. Read."},{"key":"26_CR56","doi-asserted-by":"crossref","unstructured":"Feng, L., Elhadad, N., Huenerfauth, M.: Cognitively motivated features for readability assessment. In: Proceedings of the 12th Conference of the European Chapter of the ACL (EACL 2009), pp. 229\u2013237 (2009)","DOI":"10.3115\/1609067.1609092"},{"key":"26_CR57","unstructured":"Redmiles, E.M., et al.: First steps toward measuring the readability of security advice, ed (2018)"},{"key":"26_CR58","doi-asserted-by":"crossref","unstructured":"Harbach, M., Fahl, S., Muders, T., Smith, M.:Towards measuring warning readability. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 989\u2013991 (2012)","DOI":"10.1145\/2382196.2382301"},{"key":"26_CR59","doi-asserted-by":"crossref","unstructured":"Felt, A.P., et al.: Improving SSL warnings: comprehension and adherence. In: ACM Conference on Human Factors in Computing Systems, Seoul, Republic of Korea (2015)","DOI":"10.1145\/2702123.2702442"},{"key":"26_CR60","unstructured":"Flesch, R.: Flesch-Kincaid readability test. Retrieved October, vol. 26, p. 3 (2007)"},{"key":"26_CR61","unstructured":"Scranton, M.A.: SMOG grading: a readability formula by G. Harry McLaughlin. Kansas State University (1970)"},{"key":"26_CR62","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/TPC.2016.2635720","volume":"60","author":"S Zhou","year":"2017","unstructured":"Zhou, S., Jeong, H., Green, P.A.: How consistent are the best-known readability equations in estimating the readability of design standards? IEEE Trans. Prof. Commun. 60, 97\u2013111 (2017)","journal-title":"IEEE Trans. Prof. Commun."},{"key":"26_CR63","unstructured":"Webex. https:\/\/www.webfx.com\/tools\/read-able\/check.php. Accessed 28 Dec 2020"},{"key":"26_CR64","doi-asserted-by":"publisher","first-page":"144","DOI":"10.24036\/jelt.v9i1.107848","volume":"9","author":"N Hidayatillah","year":"2020","unstructured":"Hidayatillah, N., Zainil, Y.: The readability of students\u2019 textbook used in semantic and pragmatic course in english language education program of UNP. J. Engl. Lang. Teach. 9, 144\u2013159 (2020)","journal-title":"J. Engl. Lang. Teach."},{"key":"26_CR65","first-page":"177","volume":"3","author":"P Heydari","year":"2012","unstructured":"Heydari, P., Riazi, A.M.: Readability of texts: human evaluation versus computer index. Mediterr. J. Soc. Sci. 3, 177\u2013190 (2012)","journal-title":"Mediterr. J. Soc. Sci."}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-77392-2_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T22:30:30Z","timestamp":1751495430000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-77392-2_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030773915","9783030773922"],"references-count":65,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-77392-2_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"3 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}