{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:00:31Z","timestamp":1772042431733,"version":"3.50.1"},"publisher-location":"Cham","reference-count":64,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030948214","type":"print"},{"value":"9783030948221","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-94822-1_16","type":"book-chapter","created":{"date-parts":[[2022,2,8]],"date-time":"2022-02-08T13:03:04Z","timestamp":1644325384000},"page":"280-305","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Longitudinal Compliance Analysis of Android Applications with Privacy Policies"],"prefix":"10.1007","author":[{"given":"Saad Sajid","family":"Hashmi","sequence":"first","affiliation":[]},{"given":"Nazar","family":"Waheed","sequence":"additional","affiliation":[]},{"given":"Gioacchino","family":"Tangari","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Ikram","sequence":"additional","affiliation":[]},{"given":"Stephen","family":"Smith","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,8]]},"reference":[{"key":"16_CR1","unstructured":"Complaint In the Matter of Snapchat, Inc., December 2014. https:\/\/www.ftc.gov\/system\/files\/documents\/cases\/141231snapchatcmpt.pdf,. Accessed 15 Oct 2021"},{"key":"16_CR2","unstructured":"Decision and Order In the Matter of Snapchat, Inc., December 2014. https:\/\/www.ftc.gov\/system\/files\/documents\/cases\/141231snapchatdo.pdf. Accessed 15 Oct 2021"},{"key":"16_CR3","unstructured":"Video Social Networking App Musical.ly Agrees to Settle FTC Allegations That it Violated Children\u2019s Privacy Law (2019). https:\/\/www.ftc.gov\/news-events\/press-releases\/2019\/02\/video-social-networking-app-musically-agrees-settle-ftc. Accessed 15 Oct 2021"},{"key":"16_CR4","unstructured":"TikTok To Pay \\$92 Million To Settle Class-Action Suit Over \u2018Theft\u2019 Of Personal Data (2021). https:\/\/www.npr.org\/2021\/02\/25\/971460327. Accessed 15 Oct 2021"},{"key":"16_CR5","unstructured":"TikTok Child Privacy Lawsuit Alleges Misuse of Personal Data of Millions of Minors (2021). https:\/\/www.cpomagazine.com\/data-protection\/tiktok-child-privacy-lawsuit-alleges-misuse-of-personal-data-of-millions-of-minors. Accessed 15 Oct 2021"},{"key":"16_CR6","unstructured":"1 in 5 children\u2019s Google Play Apps breach Children\u2019s Online Privacy Protection Act rules\u2019(2021). https:\/\/www.comparitech.com\/blog\/vpn-privacy\/app-coppa-study. Accessed 15 Oct 2021"},{"key":"16_CR7","unstructured":"California Legislative Information - Internet Privacy Requirements (2003). https:\/\/leginfo.legislature.ca.gov\/faces\/codes_displaySection.html. Accessed 15 Oct 2021"},{"key":"16_CR8","unstructured":"California Legislative Information - AB-375 Privacy: personal information: businesses (2018). https:\/\/leginfo.legislature.ca.gov\/faces\/billTextClient.xhtml. Accessed 15 Oct 2021"},{"key":"16_CR9","unstructured":"Children\u2019s Online Privacy Protection Act of 1998 (COPPA) (1998). https:\/\/www.govtrack.us\/congress\/bills\/105\/hr4328. Accessed 15 Oct 2021"},{"key":"16_CR10","unstructured":"EU Regulation - protection of natural persons with regard to the processing of personal data and on the free movement of such data (2016). https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj. Accessed 15 Oct 2021"},{"key":"16_CR11","unstructured":"Data Protection Act 2018 (2018). https:\/\/www.legislation.gov.uk\/ukpga\/2018\/12\/contents. Accessed 15 Oct 2021"},{"key":"16_CR12","unstructured":"The Privacy Act - OAIC (1988). https:\/\/www.oaic.gov.au\/privacy\/the-privacy-act. Accessed: 15 Oct 2021"},{"issue":"1\u20132","key":"16_CR13","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.ijhcs.2005.04.019","volume":"63","author":"C Jensen","year":"2005","unstructured":"Jensen, C., Potts, C., Jensen, C.: Privacy practices of internet users: self-reports versus observed behavior. Int. J. Hum. Comput. Stud. 63(1\u20132), 203\u2013227 (2005)","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"16_CR14","first-page":"543","volume":"4","author":"AM McDonald","year":"2008","unstructured":"McDonald, A.M., Cranor, L.F.: The cost of reading privacy policies. I\/S J. Law Policy Inf. Soc. (Isjlp) 4, 543\u2013568 (2008)","journal-title":"I\/S J. Law Policy Inf. Soc. (Isjlp)"},{"key":"16_CR15","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985752","volume-title":"Privacy Policies as Decision-Making Tools: An Evaluation of Online Privacy Notices","author":"C Jensen","year":"2004","unstructured":"Jensen, C., Potts, C.: Privacy Policies as Decision-Making Tools: An Evaluation of Online Privacy Notices. Association for Computing Machinery, New York (2004)"},{"key":"16_CR16","first-page":"273","volume":"10","author":"LF Cranor","year":"2012","unstructured":"Cranor, L.F.: Necessary but not sufficient: standardized mechanisms for privacy notice and choice. J. Telecommun. High Technol. Law 10, 273\u2013307 (2012)","journal-title":"J. Telecommun. High Technol. Law"},{"key":"16_CR17","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884855","volume-title":"Toward a Framework for Detecting Privacy Policy Violations in Android Application Code","author":"R Slavin","year":"2016","unstructured":"Slavin, R., et al.: Toward a Framework for Detecting Privacy Policy Violations in Android Application Code. Association for Computing Machinery, New York (2016)"},{"key":"16_CR18","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180196","volume-title":"GUILeak: tracing privacy policy claims on user input data for android applications","author":"X Wang","year":"2018","unstructured":"Wang, X., Qin, X., Hosseini, M.B., Slavin, R., Breaux, T.D., Niu, J.: GUILeak: tracing privacy policy claims on user input data for android applications. Association for Computing Machinery, New York (2018)"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Reyes, I., et al.: Won\u2019t somebody think of the children? Examining COPPA compliance at scale. In: Proceedings on Privacy Enhancing Technologies (2018)","DOI":"10.1515\/popets-2018-0021"},{"key":"16_CR20","unstructured":"Okoyomon, E., et al.: On the ridiculousness of notice and consent: Contradictions in app privacy policies (2019)"},{"issue":"3","key":"16_CR21","doi-asserted-by":"publisher","first-page":"222","DOI":"10.2478\/popets-2020-0050","volume":"2020","author":"C Han","year":"2020","unstructured":"Han, C., et al.: The price is (not) right: comparing privacy in free and paid apps. Proceedings on Privacy Enhancing Technologies 2020(3), 222\u2013242 (2020)","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"key":"16_CR22","doi-asserted-by":"crossref","unstructured":"Zimmeck, S., et al.: MAPS: Scaling privacy compliance analysis to a million apps. In: 19th Privacy Enhancing Technologies Symposium (PETS 2019), July 2019, vol. 3, pp. 66\u201386. Sciendo, Stockholm (2019)","DOI":"10.2478\/popets-2019-0037"},{"key":"16_CR23","unstructured":"Andow, B., et al.: Actions speak louder than words: entity-sensitive privacy policy and data flow analysis with PoliCheck. In: USENIX Security Symposium (2020)"},{"key":"16_CR24","unstructured":"Google Play Unofficial Python API. https:\/\/github.com\/NoMore201\/googleplay-api. Accessed 15 Oct 2021"},{"key":"16_CR25","unstructured":"User Data\u2014Privacy, Security, and Deception - Developer Policy Center. https:\/\/play.google.com\/intl\/en-US\/about\/privacy-security-deception\/user-data. Accessed 15 Oct 2021"},{"key":"16_CR26","unstructured":"Internet Archive: Digital Library of Free & Borrowable Books, Movies, Music & Wayback Machine. http:\/\/archive.org. Accessed 15 Oct 2021"},{"key":"16_CR27","doi-asserted-by":"crossref","unstructured":"Hashmi, S.S., Ikram, M., Kaafar, M.A.: A longitudinal analysis of online ad-blocking blacklists. In: Proceedings of the IEEE 44th LCN Symposium on Emerging Topics in Networking, Osnabr\u00fcck, Germany, pp. 158\u2013165 (2019)","DOI":"10.1109\/LCNSymposium47956.2019.9000671"},{"key":"16_CR28","unstructured":"Help with the EU user consent policy - Company - Google (2018). https:\/\/www.google.com\/about\/company\/user-consent-policy-help. Accessed 15 Oct 2021"},{"key":"16_CR29","unstructured":"Momento: Time Travel (2020). http:\/\/timetravel.mementoweb.org. Accessed 15 Oct 2021"},{"key":"16_CR30","doi-asserted-by":"crossref","unstructured":"Wilson, S., et al.: The creation and analysis of a website privacy policy corpus. In: Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics (ACL). Association for Computational Linguistics, Berlin August 2016","DOI":"10.18653\/v1\/P16-1126"},{"key":"16_CR31","unstructured":"Liu, F., Wilson, S., Story, P., Zimmeck, S., Sadeh, N.: Towards Automatic Classification of Privacy Policy Text. School of Computer Science Carnegie Mellon University, Pittsburgh, USA, Technical report. CMU-ISR-17-118R, June 2018"},{"key":"16_CR32","unstructured":"TF-IDF : A Single-Page Tutorial - Information Retrieval and Text Mining (2020). http:\/\/www.tfidf.com"},{"key":"16_CR33","unstructured":"Story, P., et al.: Natural language processing for mobile app privacy compliance. In: AAAI Spring Symposium on Privacy Enhancing AI and Language Technologies (PAL), March 2019"},{"issue":"4","key":"16_CR34","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/s00799-015-0156-0","volume":"17","author":"J Beel","year":"2015","unstructured":"Beel, J., Gipp, B., Langer, S., Breitinger, C.: Research-paper recommender systems: a literature survey. Int. J. Digit. Libr. 17(4), 305\u2013338 (2015). https:\/\/doi.org\/10.1007\/s00799-015-0156-0","journal-title":"Int. J. Digit. Libr."},{"key":"16_CR35","unstructured":"Chakraborty, G., Pagolu, M., Garla, S.: Text Mining and Analysis: Practical Methods, Examples, and Case Studies Using SAS. SAS Institute (2014)"},{"key":"16_CR36","unstructured":"Convert a collection of raw documents to a matrix of TF-IDF features. https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.feature_extraction.text. TfidfVectorizer.html. Accessed 15 Oct 2021"},{"key":"16_CR37","unstructured":"APP-350 Corpus (2019). https:\/\/usableprivacy.org\/data. Accessed 15 Oct 2021"},{"key":"16_CR38","unstructured":"One-vs-the-rest (OvR) multiclass\/multilabel strategy. https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.multiclass\/OneVsRestClassifier.html. Accessed 15 Oct 2021"},{"key":"16_CR39","unstructured":"Naive Bayes classifier for multinomial models. https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.naive_bayes\/MultinomialNB.html. Accessed 15-Oct 2021"},{"key":"16_CR40","unstructured":"Logistic Regression (aka logit, MaxEnt) classifier. https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.linear_model. LogisticRegression.html. Accessed 15 Oct 2021"},{"key":"16_CR41","unstructured":"Linear Support Vector Classification (SVC). https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.svm.LinearSVC.html. Accessed 15 Oct 2021"},{"key":"16_CR42","unstructured":"Apktool - A tool for reverse engineering Android apk files. https:\/\/ibotpeaches.github.io\/Apktool\/. Accessed 15 Oct 2021"},{"key":"16_CR43","unstructured":"Api reference|android developers. https:\/\/developer.android.com\/reference. Accessed 15 Oct 2021"},{"key":"16_CR44","unstructured":"Java documentation: Naming a Package. https:\/\/docs.oracle.com\/javase\/tutorial\/java\/package\/namingpkgs.html. Accessed 15 Oct 2021"},{"key":"16_CR45","volume-title":"Third Party Tracking in the Mobile EcosystemThird Party Tracking in the Mobile Ecosystem","author":"R Binns","year":"2018","unstructured":"Binns, R., Lyngs, U., Van Kleek, M., Zhao, J., Libert, T., Shadbolt, N.: Third Party Tracking in the Mobile EcosystemThird Party Tracking in the Mobile Ecosystem. Association for Computing Machinery, New York (2018)"},{"key":"16_CR46","doi-asserted-by":"crossref","unstructured":"Lindorfer, M., Neugschwandtner, M., Weichselbaum, L., Fratantonio, Y., van der Veen, V., Platzer, C.: ANDRUBIS - 1,000,000 apps later: a view on current android malware behaviors. In: Proceedings - 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS 2014, pp. 3\u201317 (2014)","DOI":"10.1109\/BADGERS.2014.7"},{"key":"16_CR47","doi-asserted-by":"crossref","unstructured":"Ren, J., Lindorfer, M., Dubois, D.J., Rao, A., Choffnes, D.R., Vallina-Rodriguez, N.: Bug fixes, improvements, ... and privacy leaks: a longitudinal study of PII leaks across android app versions. In: Proceedings of Network and Distributed System Security Symposium (2018)","DOI":"10.14722\/ndss.2018.23143"},{"key":"16_CR48","unstructured":"GitHub - Eyasics\/recon: Personal Information Exfiltration Detection Using Machine Learning (2016). https:\/\/github.com\/Eyasics\/recon. Accessed 15 Oct 2021"},{"key":"16_CR49","unstructured":"Ren, J., Rao, A., Lindorfer, M., Legout, A., Choffnes, D.: ReCon: revealing and controlling PII leaks in mobile network traffic. In: Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2016, pp. 361\u2013374. Association for Computing Machinery, New York (2016)"},{"key":"16_CR50","unstructured":"ReCon - Controlled Experiments Code and Data (2016) https:\/\/recon.meddle.mobi\/codeanddata.html. Accessed 15 Oct 2021"},{"key":"16_CR51","unstructured":"ReCon - Format validation and String manipulation (2016). https:\/\/github.com\/Eyasics\/recon\/blob\/master\/code\/src\/meddle\/RString.java. Accessed 15 Oct 2021"},{"key":"16_CR52","unstructured":"Android\u2019s UI\/Application Excerciser Monkey. https:\/\/developer.android.com\/studio\/test\/monkey. Accessed 15 Oct 2021"},{"key":"16_CR53","unstructured":"mitmproxy - an interactive HTTPS proxy. https:\/\/mitmproxy.org. Accessed 15 Oct 2021"},{"key":"16_CR54","unstructured":"Understanding Dual Stacking of IPv4 and IPv6 Unicast Addresses (2020). https:\/\/www.juniper.net\/documentation\/en_US\/junos\/topics\/concept\/ipv6-dual-stack-understanding.html"},{"key":"16_CR55","unstructured":"Zheng, H., et al.: Automated test input generation for android: towards getting there in an industrial case. IEEE Press (2017)"},{"key":"16_CR56","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-642-30921-2_17","volume-title":"Trust and Trustworthy Computing","author":"C Gibler","year":"2012","unstructured":"Gibler, C., Crussell, J., Erickson, J., Chen, H.: AndroidLeaks: automatically detecting potential privacy leaks in android applications on a large scale. In: Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust 2012. LNCS, vol. 7344, pp. 291\u2013307. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-30921-2_17"},{"key":"16_CR57","volume-title":"A Measurement Study of Google Play","author":"N Viennot","year":"2014","unstructured":"Viennot, N., Garcia, E., Nieh, J.: A Measurement Study of Google Play. Association for Computing Machinery, New York (2014)"},{"key":"16_CR58","unstructured":"Fitbit home-page on Google Play. https:\/\/play.google.com\/store\/apps\/details?id=com.fitbit.FitbitMobile. Accessed 15 Oct 2021"},{"key":"16_CR59","doi-asserted-by":"crossref","unstructured":"Hashmi, S.S., Ikram, M., Smith, S.: On optimization of ad-blocking lists for mobile devices. In: Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, pp. 220\u2013227 (2019)","DOI":"10.1145\/3360774.3360830"},{"key":"16_CR60","doi-asserted-by":"crossref","unstructured":"Ikram, M., Beaume, P., K\u00e2afar, M.A.: DaDiDroid: an obfuscation resilient tool for detecting android malware via weighted directed call graph modelling. In: Obaidat, M.S., Samarati, P. (eds.) Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, ICETE 2019, SECRYPT, Prague, Czech Republic, 26\u201328 July 2019, vol. 2, pp. 211\u2013219. SciTePress (2019)","DOI":"10.5220\/0007834602110219"},{"issue":"4","key":"16_CR61","doi-asserted-by":"publisher","first-page":"148595","DOI":"10.1155\/2014\/148595","volume":"10","author":"S-K Jo","year":"2014","unstructured":"Jo, S.-K., Ikram, M., Jung, I., Ryu, W., Kim, J.: Power efficient clustering for wireless multimedia sensor network. Int. J. Distrib. Sens. Netw. 10(4), 148595 (2014)","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"16_CR62","doi-asserted-by":"crossref","unstructured":"Ikram., M., Kaafar, M.A.: A first look at mobile ad-blocking apps. In: 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA), pp. 1\u20138 (2017)","DOI":"10.1109\/NCA.2017.8171376"},{"key":"16_CR63","doi-asserted-by":"crossref","unstructured":"Zhao, B.Z.H., Ikram, M., Asghar, H.J., Kaafar, M.A., Chaabane, A., Thilakarathna, K.: A decade of mal-activity reporting: a retrospective analysis of internet malicious activity blacklists. In: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, pp. 193\u2013205 (2019)","DOI":"10.1145\/3321705.3329834"},{"key":"16_CR64","doi-asserted-by":"crossref","unstructured":"Libert, T.: An automated approach to auditing disclosure of third-party data collection in website privacy policies. In: Republic and Canton of Geneva, CHE: International World Wide Web Conferences Steering Committee (2018)","DOI":"10.1145\/3178876.3186087"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile and Ubiquitous Systems: Computing, Networking and Services"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-94822-1_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,9]],"date-time":"2022-05-09T19:13:21Z","timestamp":1652123601000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-94822-1_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030948214","9783030948221"],"references-count":64,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-94822-1_16","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"8 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MobiQuitous","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 November 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 November 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mobiquitous2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/mobiquitous.eai-conferences.org\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy +","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"115","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"55","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}