{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T08:03:06Z","timestamp":1743148986985,"version":"3.40.3"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030856090"},{"type":"electronic","value":"9783030856106"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-85610-6_17","type":"book-chapter","created":{"date-parts":[[2021,8,25]],"date-time":"2021-08-25T06:03:15Z","timestamp":1629871395000},"page":"287-297","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["BRIDGE: Administering Small Anonymous Longitudinal HCI Studies with Snowball-Type Sampling"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7781-748X","authenticated-orcid":false,"given":"Frode Eika","family":"Sandnes","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,26]]},"reference":[{"key":"17_CR1","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.ijhcs.2016.04.006","volume":"92","author":"G Berget","year":"2016","unstructured":"Berget, G., Mulvey, F., Sandnes, F.E.: Is visual content in textual search interfaces beneficial to dyslexic users? Int. J. Hum.-Comput. Stud. 92, 17\u201329 (2016)","journal-title":"Int. J. Hum.-Comput. Stud."},{"issue":"1","key":"17_CR2","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s10209-020-00712-z","volume":"20","author":"ADP dos Santos","year":"2020","unstructured":"dos Santos, A.D.P., Medola, F.O., Cinelli, M.J., Garcia Ramirez, A.R., Sandnes, F.E.: Are electronic white canes better than traditional canes? A comparative study with blind and blindfolded participants. Univ. Access Inf. Soc. 20(1), 93\u2013103 (2020). https:\/\/doi.org\/10.1007\/s10209-020-00712-z","journal-title":"Univ. Access Inf. Soc."},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Sankhi, P., Sandnes, F.E.: A glimpse into smartphone screen reader use among blind teenagers in rural Nepal. Disab. Rehabil. Assist. Technol. (2020)","DOI":"10.1080\/17483107.2020.1818298"},{"key":"17_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1007\/978-3-030-29387-1_37","volume-title":"Human-Computer Interaction \u2013 INTERACT 2019","author":"TB Aschim","year":"2019","unstructured":"Aschim, T.B., Gjerstad, J.L., Lien, L.V., Tahsin, R., Sandnes, F.E.: Are split tablet keyboards better? A study of soft keyboard layout and hand posture. In: Lamas, D., Loizides, F., Nacke, L., Petrie, H., Winckler, M., Zaphiris, P. (eds.) INTERACT 2019. LNCS, vol. 11748, pp. 647\u2013655. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-29387-1_37"},{"key":"17_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/978-3-030-49282-3_19","volume-title":"Universal Access in Human-Computer Interaction. Design Approaches and Supporting Technologies","author":"HM Kaushik","year":"2020","unstructured":"Kaushik, H.M., Eika, E., Sandnes, F.E.: Towards universal accessibility on the web: do grammar checking tools improve text readability? In: Antona, M., Stephanidis, C. (eds.) HCII 2020. LNCS, vol. 12188, pp. 272\u2013288. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-49282-3_19"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Vissers, J., De Bot, L., Zaman, B.: MemoLine: evaluating long-term UX with children. In: Proceedings of the 12th International Conference Interaction Design and Children, pp. 285\u2013288. ACM, New York (2013)","DOI":"10.1145\/2485760.2485836"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Jain, J., Boyce, S.: Case study: longitudinal comparative analysis for analyzing user behavior. In: CHI 2012 Extended Abstracts, pp. 793\u2013800. ACM, New York (2012).","DOI":"10.1145\/2212776.2212852"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Karapanos, E., Zimmerman, J., Forlizzi, J., Martens, J.B.: User experience over time: an initial framework. In: Proceedings of the SIGCHI CHI 2009 Conference, pp. 729\u2013738. ACM, New York (2009)","DOI":"10.1145\/1518701.1518814"},{"key":"17_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-030-49282-3_16","volume-title":"Universal Access in Human-Computer Interaction. Design Approaches and Supporting Technologies","author":"L Ye","year":"2020","unstructured":"Ye, L., Sandnes, F.E., MacKenzie, I.S.: QB-Gest: qwerty bimanual gestural input for eyes-free smartphone text input. In: Antona, M., Stephanidis, C. (eds.) HCII 2020. LNCS, vol. 12188, pp. 223\u2013242. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-49282-3_16"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Sandnes, F.E.: Can spatial mnemonics accelerate the learning of text input chords? In: Proceedings of the Working Conference on Advanced Visual Interfaces, pp. 245\u2013249. ACM, New York (2006)","DOI":"10.1145\/1133265.1133313"},{"issue":"5","key":"17_CR11","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1177\/0193841X10387576","volume":"34","author":"R Schnell","year":"2010","unstructured":"Schnell, R., Bachteler, T., Reiher, J.: Improving the use of self-generated identification codes. Eval. Rev. 34(5), 391\u2013418 (2010)","journal-title":"Eval. Rev."},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Schnell, R., Bachteler, T., Reiher, J.: Privacy-preserving record linkage using bloom filters. BMC Med. Informat. Decis. Mak. 9(1) (2009)","DOI":"10.1186\/1472-6947-9-41"},{"key":"17_CR13","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"628","DOI":"10.1007\/978-3-319-57454-7_49","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"P Christen","year":"2017","unstructured":"Christen, P., Schnell, R., Vatsalan, D., Ranbaduge, T.: Efficient cryptanalysis of bloom filters for privacy-preserving record linkage. In: Kim, J., Shim, K., Cao, L., Lee, J.-G., Lin, X., Moon, Y.-S. (eds.) PAKDD 2017. LNCS (LNAI), vol. 10234, pp. 628\u2013640. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-57454-7_49"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Sandnes, F.E.: HIDE: short IDs for robust and anonymous linking of users across multiple sessions in small HCI experiments. In: CHI 2021 Conference on Human Factors in Computing Systems Extended Abstracts Proceedings. ACM, New York (2021)","DOI":"10.1145\/3411763.3451794"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Harron, K., et al.: Challenges in administrative data linkage for research. Big Data Soc. 4(2) (2017)","DOI":"10.1177\/2053951717745678"},{"key":"17_CR16","doi-asserted-by":"publisher","unstructured":"Audrey, S., Brown, L., Campbell, R., Boyd, A., Macleod, J.: Young people\u2019s views about consenting to data linkage: findings from the PEARL qualitative study. BMC Med. Res. Method. 16(1) (2016). https:\/\/doi.org\/10.1186\/s12874-016-0132-4","DOI":"10.1186\/s12874-016-0132-4"},{"issue":"5","key":"17_CR17","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1177\/0193841X08316676","volume":"32","author":"LA Yurek","year":"2008","unstructured":"Yurek, L.A., Vasey, J., Sullivan Havens, D.: The use of self-generated identification codes in longitudinal research. Eval. Rev. 32(5), 435\u2013452 (2008)","journal-title":"Eval. Rev."},{"issue":"1","key":"17_CR18","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1002\/nur.4770090110","volume":"9","author":"SP Damrosch","year":"1986","unstructured":"Damrosch, S.P.: Ensuring anonymity by use of subject-generated identification codes. Res. Nurs. Health 9(1), 61\u201363 (1986). https:\/\/doi.org\/10.1002\/nur.4770090110","journal-title":"Res. Nurs. Health"},{"issue":"2","key":"17_CR19","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1002\/(SICI)1098-240X(200004)23:2<167::AID-NUR9>3.0.CO;2-K","volume":"23","author":"C DiIorio","year":"2000","unstructured":"DiIorio, C., Soet, J.E., Van Marter, D., Woodring, T.M., Dudley, W.N.: An evaluation of a self-generated identification code. Res. Nurs. Health 23(2), 167\u2013174 (2000)","journal-title":"Res. Nurs. Health"},{"issue":"2","key":"17_CR20","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/0306-4603(89)90044-0","volume":"14","author":"JW Grube","year":"1989","unstructured":"Grube, J.W., Morgan, M., Kearney, K.A.: Using self-generated identification codes to match questionnaires in panel studies of adolescent substance use. Addict. Behav. 14(2), 159\u2013171 (1989). https:\/\/doi.org\/10.1016\/0306-4603(89)90044-0","journal-title":"Addict. Behav."},{"issue":"1B","key":"17_CR21","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1093\/poq\/48.1B.370","volume":"48","author":"KA Kearney","year":"1984","unstructured":"Kearney, K.A., Hopkins, R.H., Mauss, A.L., Weisheit, R.A.: Self-generated identification codes for anonymous collection of longitudinal questionnaire data. Public Opin. Q. 48(1B), 370\u2013378 (1984). https:\/\/doi.org\/10.1093\/poq\/48.1B.370","journal-title":"Public Opin. Q."},{"issue":"4","key":"17_CR22","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/s11121-017-0772-6","volume":"18","author":"J Vacek","year":"2017","unstructured":"Vacek, J., Vonkova, H., Gabrhel\u00edk, R.: A successful strategy for linking anonymous data from students\u2019 and parents\u2019 questionnaires using self-generated identification codes. Prev. Sci. 18(4), 450\u2013458 (2017). https:\/\/doi.org\/10.1007\/s11121-017-0772-6","journal-title":"Prev. Sci."},{"issue":"2","key":"17_CR23","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.profnurs.2018.09.006","volume":"35","author":"M Lippe","year":"2019","unstructured":"Lippe, M., Johnson, B., Carter, P.: Protecting student anonymity in research using a subject-generated identification code. J. Prof. Nurs. 35(2), 120\u2013123 (2019)","journal-title":"J. Prof. Nurs."},{"issue":"2","key":"17_CR24","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/j.ypmed.2006.07.019","volume":"44","author":"MR Galanti","year":"2007","unstructured":"Galanti, M.R., Siliquini, R., Cuomo, L., Melero, J.C., Panella, M., Faggiano, F.: Testing anonymous link procedures for follow-up of adolescents in a school-based trial: the EU-DAP pilot study. Prevent. Med. 44(2), 174\u2013177 (2007)","journal-title":"Prevent. Med."},{"issue":"6","key":"17_CR25","doi-asserted-by":"publisher","first-page":"724","DOI":"10.1177\/0193841X9602000604","volume":"20","author":"J McGloin","year":"1996","unstructured":"McGloin, J., Holcomb, S., Main, D.S.: Matching anonymous pre-posttests using subject-generated information. Eval. Rev. 20(6), 724\u2013736 (1996)","journal-title":"Eval. Rev."},{"key":"17_CR26","doi-asserted-by":"crossref","unstructured":"Thoben, W., Appelrath, H. J., Sauer, S.: Record linkage of anonymous data by control numbers. In: From Data to Knowledge, pp. 412\u2013419. Springer, Heidelberg (1996)","DOI":"10.1007\/978-3-642-79999-0_43"},{"issue":"5","key":"17_CR27","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1016\/0010-4809(92)90005-U","volume":"25","author":"C Friedman","year":"1992","unstructured":"Friedman, C., Sideli, R.: Tolerating spelling errors during patient validation. Comput. Biomed. Res. 25(5), 486\u2013509 (1992). https:\/\/doi.org\/10.1016\/0010-4809(92)90005-U","journal-title":"Comput. Biomed. Res."},{"issue":"12","key":"17_CR28","first-page":"R183","volume":"5","author":"JY Mortimer","year":"1995","unstructured":"Mortimer, J.Y., Salathiel, J.A.: \u2018Soundex\u2019 codes of surnames provide confidentiality and accuracy in a national HIV database. Commun. Dis. Rep. CDR Rev. 5(12), R183\u2013R186 (1995)","journal-title":"Commun. Dis. Rep. CDR Rev."},{"issue":"4","key":"17_CR29","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1108\/eb026883","volume":"47","author":"HJ Rogers","year":"1991","unstructured":"Rogers, H.J., Willett, P.: Searching for historical word forms in text databases using spelling-correction methods: reverse error and phonetic coding methods. J. Document. 47(4), 333\u2013353 (1991). https:\/\/doi.org\/10.1108\/eb026883","journal-title":"J. Document."},{"key":"17_CR30","unstructured":"Holmes, D., McCabe, M.C.: Improving precision and recall for soundex retrieval. In: Proceedings of the International Conference on Information Technology: Coding and Computing, pp. 22\u201326. IEEE (2002)"},{"key":"17_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/978-3-642-28879-1_2","volume-title":"Data Privacy Management and Autonomous Spontaneus Security","author":"A Karakasidis","year":"2012","unstructured":"Karakasidis, A., Verykios, V.S., Christen, P.: Fake injection strategies for private phonetic matching. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., de Capitani di Vimercati, S. (eds.) DPM\/SETOP -2011. LNCS, vol. 7122, pp. 9\u201324. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-28879-1_2"},{"key":"17_CR32","volume-title":"Natural Language Processing and Information Systems","author":"R Camps","year":"2003","unstructured":"Camps, R., Daud\u00e9, J.: Improving the efficacy of approximate searching by personal-name. In: Natural Language Processing and Information Systems. Bonn, Germany (2003)"},{"issue":"6","key":"17_CR33","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1136\/jamia.2009.002063","volume":"17","author":"SB Johnson","year":"2010","unstructured":"Johnson, S.B., Whitney, G., McAuliffe, M., Wang, H., et al.: Using global unique identifiers to link autism collections. J. Am. Med. Inform. Assoc. 17(6), 689\u2013695 (2010)","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"17_CR34","unstructured":"Bouzelat, H., Quantin, C., Dusserre, L.: Extraction and anonymity protocol of medical file. In: Proceedings of the AMIA Annual Fall Symposium, pp. 323\u2013327. AMIA, Bethesda (1996)"},{"issue":"1","key":"17_CR35","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1055\/s-0038-1633925","volume":"44","author":"C Quantin","year":"2005","unstructured":"Quantin, C., et al.: Decision analysis for the assessment of a record linkage procedure. Methods Inf. Med. 44(1), 72\u201379 (2005)","journal-title":"Methods Inf. Med."},{"key":"17_CR36","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1055\/s-0038-1634527","volume":"37","author":"AM Benhamiche","year":"1998","unstructured":"Benhamiche, A.M., Faivre, J.: Automatic record hash coding and linkage for epidemiological. Methods Inform. Med. 37, 271\u2013278 (1998)","journal-title":"Methods Inform. Med."},{"issue":"12","key":"17_CR37","doi-asserted-by":"publisher","first-page":"2956","DOI":"10.1109\/TKDE.2013.91","volume":"26","author":"EA Durham","year":"2013","unstructured":"Durham, E.A., Kantarcioglu, M., Xue, Y., Toth, C., Kuzu, M., Malin, B.: Composite bloom filters for secure record linkage. IEEE Trans. Knowl. Data Eng. 26(12), 2956\u20132968 (2013)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"17_CR38","doi-asserted-by":"crossref","unstructured":"Kroll, M., Steinmetzer, S.: Automated cryptanalysis of bloom filter encryptions of health records. German Record Linkage Center, Working Papers, No. WP-GRLC-2014-05 (2014)","DOI":"10.2139\/ssrn.3530864"},{"key":"17_CR39","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.jbi.2013.12.003","volume":"50","author":"SM Randall","year":"2014","unstructured":"Randall, S.M., Ferrante, A.M., Boyd, J.H., Bauer, J.K., Semmens, J.B.: Privacy-preserving record linkage on large real world datasets. J. Biomed. Inform. 50, 205\u2013212 (2014)","journal-title":"J. Biomed. Inform."},{"key":"17_CR40","doi-asserted-by":"crossref","unstructured":"Niedermeyer, F., Steinmetzer, S., Kroll, M., Schnell, R.: Cryptanalysis of basic bloom filters used for privacy preserving record linkage. German Record Linkage Center, Working Paper Series, No. WP-GRLC-2014-04 (2014)","DOI":"10.2139\/ssrn.3530867"},{"issue":"1","key":"17_CR41","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1145\/358808.358813","volume":"23","author":"RJ Cichelli","year":"1980","unstructured":"Cichelli, R.J.: Minimal perfect hash functions made simple. Commun. ACM 23(1), 17\u201319 (1980). https:\/\/doi.org\/10.1145\/358808.358813","journal-title":"Commun. ACM"},{"issue":"5","key":"17_CR42","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1145\/3532.3538","volume":"28","author":"TJ Sager","year":"1985","unstructured":"Sager, T.J.: A polynomial time generator for minimal perfect hash functions. Commun. ACM 28(5), 523\u2013532 (1985). https:\/\/doi.org\/10.1145\/3532.3538","journal-title":"Commun. ACM"},{"key":"17_CR43","doi-asserted-by":"crossref","unstructured":"Caine, K.: Local standards for sample size at CHI. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pp. 981\u2013992. ACM, New York (2016)","DOI":"10.1145\/2858036.2858498"},{"issue":"8","key":"17_CR44","doi-asserted-by":"publisher","first-page":"e3000384","DOI":"10.1371\/journal.pbio.3000384","volume":"17","author":"JP Ioannidis","year":"2019","unstructured":"Ioannidis, J.P., Baas, J., Klavans, R., Boyack, K.W.: A standardized citation metrics author database annotated for scientific field. PLoS Biol. 17(8), e3000384 (2019)","journal-title":"PLoS Biol."},{"issue":"2","key":"17_CR45","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1037\/h0043158","volume":"63","author":"GA Miller","year":"1956","unstructured":"Miller, G.A.: The magical number seven, plus or minus two: some limits on our capacity for processing information. Psychol. Rev. 63(2), 81\u201397 (1956)","journal-title":"Psychol. Rev."},{"issue":"05","key":"17_CR46","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncert. Fuzz. Knowl.-Based Syst. 10(05), 557\u2013570 (2002)","journal-title":"Int. J. Uncert. Fuzz. Knowl.-Based Syst."}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction \u2013 INTERACT 2021"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-85610-6_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,3]],"date-time":"2021-12-03T22:11:37Z","timestamp":1638569497000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-85610-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030856090","9783030856106"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-85610-6_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"26 August 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INTERACT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bari","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"interact2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.interact2021.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"PCS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"680","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"105","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"72","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}