{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:04:57Z","timestamp":1743127497963,"version":"3.40.3"},"publisher-location":"Cham","reference-count":47,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030956295"},{"type":"electronic","value":"9783030956301"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-95630-1_22","type":"book-chapter","created":{"date-parts":[[2022,1,22]],"date-time":"2022-01-22T17:02:23Z","timestamp":1642870943000},"page":"311-324","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Extending Traceability Technique to Client Forensic Investigation"],"prefix":"10.1007","author":[{"given":"Adesoji","family":"Adesina","sequence":"first","affiliation":[]},{"given":"Ayodele Ariyo","family":"Adebiyi","sequence":"additional","affiliation":[]},{"given":"Charles Korede","family":"Ayo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,23]]},"reference":[{"issue":"1","key":"22_CR1","doi-asserted-by":"publisher","first-page":"012055","DOI":"10.1088\/1742-6596\/801\/1\/012055","volume":"801","author":"R Bahaweres","year":"2017","unstructured":"Bahaweres, R., Santo, N.B., Ningsih, A.: Cloud based drive forensic and DDoS analysis on seafile as case study. J. Phys. Conf. Ser. 801(1), 012055 (2017). https:\/\/doi.org\/10.1088\/1742-6596\/801\/1\/012055","journal-title":"J. Phys. Conf. Ser."},{"key":"22_CR2","doi-asserted-by":"publisher","unstructured":"Abdalla, P., Varol, A.: Advantages to disadvantages of cloud computing for small-sized business. In: 2019 7th International Symposium on Digital Forensics and Security (ISDFS) (2019). https:\/\/doi.org\/10.1109\/isdfs.2019.8757549","DOI":"10.1109\/isdfs.2019.8757549"},{"issue":"4","key":"22_CR3","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1016\/j.jestch.2018.05.010","volume":"21","author":"I Indu","year":"2018","unstructured":"Indu, I., Anand, P., Bhaskar, V.: Identity and access management in cloud environment: mechanisms and challenges. Eng. Sci. Technol. Int. J. 21(4), 574\u2013588 (2018). https:\/\/doi.org\/10.1016\/j.jestch.2018.05.010","journal-title":"Eng. Sci. Technol. Int. J."},{"issue":"3","key":"22_CR4","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1177\/1367877916628239","volume":"20","author":"S Wang","year":"2016","unstructured":"Wang, S.: The cloud, online piracy and global copyright governance. Int. J. Cult. Stud. 20(3), 270\u2013286 (2016). https:\/\/doi.org\/10.1177\/1367877916628239","journal-title":"Int. J. Cult. Stud."},{"issue":"1","key":"22_CR5","first-page":"93","volume":"11","author":"F Neagu","year":"2019","unstructured":"Neagu, F., Savu, A.: Comparative study on cyberterrorism in East Asia and North Africa. Knowl. Horiz. Econ. 11(1), 93\u201398 (2019)","journal-title":"Knowl. Horiz. Econ."},{"key":"22_CR6","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/978-3-030-32475-9_27","volume-title":"Applied Informatics","author":"M Olowu","year":"2019","unstructured":"Olowu, M., Yinka-Banjo, C., Misra, S., Florez, H.: A Secured private-cloud computing system. In: Florez, H., Leon, M., Diaz-Nafria, J.M., Belli, S. (eds.) ICAI 2019. CCIS, vol. 1051, pp. 373\u2013384. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32475-9_27"},{"issue":"1","key":"22_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1504\/IJESDF.2017.081749","volume":"9","author":"F Molina","year":"2017","unstructured":"Molina, F., Rodriguez, G.: The preservation of digital evidence and its admissibility in the court. Int. J. Electron. Secur. Digit. Forensics 9(1), 1\u201318 (2017). https:\/\/doi.org\/10.1504\/IJESDF.2017.081749","journal-title":"Int. J. Electron. Secur. Digit. Forensics"},{"key":"22_CR8","doi-asserted-by":"publisher","unstructured":"Prasad, M., Rama, K., Suresh, S., Sriraman, K.: Reconstruction of events in digital forensics. Comput. Eng. Appl. J. 2(2). https:\/\/doi.org\/10.18495\/comengapp.v2i2.24","DOI":"10.18495\/comengapp.v2i2.24"},{"issue":"11","key":"22_CR9","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/S1353-4858(14)70112-6","volume":"2014","author":"M Taylor","year":"2014","unstructured":"Taylor, M., Gresty, D., Almond, P., Berry, T.: Forensic investigations of social networking applications. Netw. Secur. 2014(11), 9\u201316 (2014)","journal-title":"Netw. Secur."},{"key":"22_CR10","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/j.jnca.2013.09.016","volume":"40","author":"D Quick","year":"2014","unstructured":"Quick, D., Choo, K.: Google Drive: Forensic analysis of data remnants. J. Netw. Comput. Appl. 40, 179\u2013193 (2014). https:\/\/doi.org\/10.1016\/j.jnca.2013.09.016","journal-title":"J. Netw. Comput. Appl."},{"issue":"7","key":"22_CR11","doi-asserted-by":"publisher","first-page":"20","DOI":"10.5120\/ijca2015905521","volume":"124","author":"G Al","year":"2015","unstructured":"Al, G.: Cloud computing architecture and forensic investigation challenges. Int. J. Comput. Appl. 124(7), 20\u201325 (2015). https:\/\/doi.org\/10.5120\/ijca2015905521","journal-title":"Int. J. Comput. Appl."},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Shariati, M., Ali, D.: Ubuntu one investigation: detecting evidences on clients machines. In: The Cloud Security Eco-System, pp. 429\u2013446. Elsevier (2015)","DOI":"10.1016\/B978-0-12-801595-7.00019-7"},{"issue":"1","key":"22_CR13","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1111\/1556-4029.13506","volume":"63","author":"A Ahmed","year":"2018","unstructured":"Ahmed, A., Xue Li, C.: Analyzing data remnant remains on user devices to determine probative artifacts in cloud environment. J. Forensic Sci. 63(1), 112\u2013121 (2018). https:\/\/doi.org\/10.1111\/1556-4029.13506","journal-title":"J. Forensic Sci."},{"key":"22_CR14","doi-asserted-by":"publisher","unstructured":"Chaurasia, G.: Issues in acquiring digital evidence from cloud. J. Forensic Res. S3 (2015). https:\/\/doi.org\/10.4172\/2157-7145.1000s3-001","DOI":"10.4172\/2157-7145.1000s3-001"},{"key":"22_CR15","unstructured":"Han, J., Kim, J., Lee, S.: 5W1H-based expression for the effective sharing of information in digital forensic investigations. https:\/\/arxiv.org\/pdf\/2010.15711"},{"issue":"2","key":"22_CR16","doi-asserted-by":"publisher","first-page":"275","DOI":"10.22364\/bjmc.2020.8.2.05","volume":"8","author":"S Grigaliunas","year":"2020","unstructured":"Grigaliunas, S., Toldinas, J.: Habits attribution and digital evidence object models based tool for cybercrime investigation. J. Modern Comput. 8(2), 275\u2013292 (2020). https:\/\/doi.org\/10.22364\/bjmc.2020.8.2.05","journal-title":"J. Modern Comput."},{"key":"22_CR17","doi-asserted-by":"publisher","unstructured":"NIST Cloud Computing Forensic Science Challenges. https:\/\/doi.org\/10.6028\/NIST.IR.8006","DOI":"10.6028\/NIST.IR.8006"},{"key":"22_CR18","doi-asserted-by":"publisher","unstructured":"Ahmed, I., Roussev, V.: Analysis of cloud digital evidence. In: Security, Privacy, and Digital Forensics in the Cloud, pp. 301\u2013319 (2019). https:\/\/doi.org\/10.1002\/9781119053385.ch15","DOI":"10.1002\/9781119053385.ch15"},{"issue":"1","key":"22_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.24966\/flis-733x\/100045","volume":"6","author":"A Yeboah-Ofori","year":"2020","unstructured":"Yeboah-Ofori, A.: Digital forensics investigation jurisprudence: issues of admissibility of digital evidence. J. Forensic Leg. Invest. Sci. 6(1), 1\u20138 (2020). https:\/\/doi.org\/10.24966\/flis-733x\/100045","journal-title":"J. Forensic Leg. Invest. Sci."},{"issue":"1","key":"22_CR20","doi-asserted-by":"publisher","first-page":"2273","DOI":"10.1016\/j.procs.2010.04.255","volume":"1","author":"M Munk","year":"2010","unstructured":"Munk, M., Kapusta, J., \u0160vec, P.: Data preprocessing evaluation for web log mining: reconstruction of activities of a web visitor. Procedia Comput. Sci. 1(1), 2273\u20132280 (2010). https:\/\/doi.org\/10.1016\/j.procs.2010.04.255","journal-title":"Procedia Comput. Sci."},{"key":"22_CR21","unstructured":"Qadir, A., Varol, A.: The role of machine learning in digital forensics. IEEE Xplore. ieeexplore.ieee.org\/document\/9116298"},{"key":"22_CR22","doi-asserted-by":"publisher","first-page":"137293","DOI":"10.1109\/access.2020.3011259","volume":"8","author":"W Al-Khater","year":"2020","unstructured":"Al-Khater, W., Al-Maadeed, S., Ahmed, A., Sadiq, A., Khan, M.: Comprehensive review of cybercrime detection techniques. IEEE Access 8, 137293\u2013137311 (2020). https:\/\/doi.org\/10.1109\/access.2020.3011259","journal-title":"IEEE Access"},{"key":"22_CR23","doi-asserted-by":"publisher","unstructured":"Al-Mousa, M.: Analyzing cyber-attack intention for digital forensics using case-based reasoning. Int. J. Adv. Trends Comput. Sci. Eng. 8(6), 3243\u20133248. https:\/\/doi.org\/10.30534\/ijatcse\/2019\/92862019","DOI":"10.30534\/ijatcse\/2019\/92862019"},{"issue":"18","key":"22_CR24","doi-asserted-by":"publisher","first-page":"6285","DOI":"10.1002\/sec.1688","volume":"9","author":"S Simou","year":"2016","unstructured":"Simou, S., Kalloniatis, C., Gritzalis, S., Mouratidis, H.: A survey on cloud forensics challenges and solutions. Secur. Commun. Netw. 9(18), 6285\u20136314 (2016). https:\/\/doi.org\/10.1002\/sec.1688","journal-title":"Secur. Commun. Netw."},{"key":"22_CR25","doi-asserted-by":"publisher","unstructured":"Sree, T., Bhanu, S.: Data collection techniques for forensic investigation in cloud. In: Digital Forensic Science (2020). https:\/\/doi.org\/10.5772\/intechopen.82013","DOI":"10.5772\/intechopen.82013"},{"issue":"2","key":"22_CR26","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1007\/s11036-016-0791-8","volume":"22","author":"NDW Cahyani","year":"2016","unstructured":"Cahyani, N.D.W., Rahman, N.H.A., Glisson, W.B., Choo, K.-K.: The role of mobile forensics in terrorism investigations involving the use of cloud storage service and communication apps. Mob. Netw. Appl. 22(2), 240\u2013254 (2016). https:\/\/doi.org\/10.1007\/s11036-016-0791-8","journal-title":"Mob. Netw. Appl."},{"issue":"1","key":"22_CR27","doi-asserted-by":"publisher","first-page":"22","DOI":"10.14445\/22315381\/ijett-v52p205","volume":"52","author":"S Razek","year":"2017","unstructured":"Razek, S., El-Fiqi, H., Mahmoud, I.: Cloud storage forensics: survey. Int. J. Eng. Trends Technol. 52(1), 22\u201335 (2017). https:\/\/doi.org\/10.14445\/22315381\/ijett-v52p205","journal-title":"Int. J. Eng. Trends Technol."},{"issue":"4","key":"22_CR28","doi-asserted-by":"publisher","first-page":"292","DOI":"10.17781\/p002637","volume":"8","author":"T Rochmadi","year":"2019","unstructured":"Rochmadi, T., Heksaputra, D.: Forensic analysis in cloud storage with live forensics in windows (adrive case study). Int. J. Cyber-Secur. Digit. Forensics 8(4), 292\u2013297 (2019). https:\/\/doi.org\/10.17781\/p002637","journal-title":"Int. J. Cyber-Secur. Digit. Forensics"},{"issue":"26","key":"22_CR29","doi-asserted-by":"publisher","first-page":"40","DOI":"10.5120\/ijca2020920815","volume":"175","author":"T Rochmadi","year":"2020","unstructured":"Rochmadi, T., Wicaksono, Y., Nisa, N.: Digital evidence identification of android device using live forensics acquisition on cloud storage (iDrive). Int. J. Comput. Appl. 175(26), 40\u201343 (2020). https:\/\/doi.org\/10.5120\/ijca2020920815","journal-title":"Int. J. Comput. Appl."},{"issue":"3","key":"22_CR30","doi-asserted-by":"publisher","first-page":"264","DOI":"10.23834\/isrjournal.566676","volume":"4","author":"A Efe","year":"2019","unstructured":"Efe, A., Dalm\u0131\u015f, A.: Review of mobile malware forensic. J. Int. Sci. Res. 4(3), 264\u2013282 (2019). https:\/\/doi.org\/10.23834\/isrjournal.566676","journal-title":"J. Int. Sci. Res."},{"key":"22_CR31","doi-asserted-by":"crossref","unstructured":"Blakeley, B., Cooney, C., Dehghantanha, A., Aspin A.: Cloud storage forensic: HubiC as a case-study. In: Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, pp. 536\u2013541 (2015)","DOI":"10.1109\/CloudCom.2015.24"},{"issue":"1","key":"22_CR32","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1080\/00450618.2015.1021379","volume":"48","author":"M Shariati","year":"2016","unstructured":"Shariati, M., Dehghantanha, A., Choo, K.: SugarSync forensic analysis. Aust. J. Forensic Sci. 48(1), 95\u2013117 (2016). https:\/\/doi.org\/10.1080\/00450618.2015.1021379","journal-title":"Aust. J. Forensic Sci."},{"key":"22_CR33","unstructured":"Reed, A., Scanlon, M., Le-Khac, N.: Forensic analysis of epic privacy browser on windows operating systems. ArXiv, abs\/1708.01732, August 2017"},{"issue":"1","key":"22_CR34","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1016\/j.compeleceng.2016.08.020","volume":"58","author":"Y Teing","year":"2017","unstructured":"Teing, Y., Dehghantanha, A., Choo, K., Yang, L.: Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study. Comput. Electr. Eng. 58(1), 350\u2013363 (2017). https:\/\/doi.org\/10.1016\/j.compeleceng.2016.08.020","journal-title":"Comput. Electr. Eng."},{"key":"22_CR35","unstructured":"Mohtasebi, S., Dehghantanha, A., Choo, K.: Cloud storage forensics: analysis of data remnants on SpiderOak, JustCloud, and pCloud. arXiv:1706.08042 [Cs]"},{"issue":"5","key":"22_CR36","doi-asserted-by":"publisher","first-page":"e4277","DOI":"10.1002\/cpe.4277","volume":"30","author":"Y Teing","year":"2018","unstructured":"Teing, Y., Dehghantanha, A., Choo, K.: CloudMe forensics: a case of big data forensic investigation. Concurr. Comput. Pract. Exp. 30(5), e4277 (2018). https:\/\/doi.org\/10.1002\/cpe.4277","journal-title":"Concurr. Comput. Pract. Exp."},{"issue":"2","key":"22_CR37","doi-asserted-by":"publisher","first-page":"57","DOI":"10.21512\/commit.v13i2.5781","volume":"13","author":"G Satrya","year":"2019","unstructured":"Satrya, G.: Digital forensics study of a cloud storage client: a dropbox artifact analysis. CommIT Commun. Inf. Technol. J. 13(2), 57\u201366 (2019). https:\/\/doi.org\/10.21512\/commit.v13i2.5781","journal-title":"CommIT Commun. Inf. Technol. J."},{"key":"22_CR38","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-030-28752-8_5","volume-title":"Advances in Digital Forensics XV. DigitalForensics 2019","author":"S Aggarwal","year":"2019","unstructured":"Aggarwal, S., et al.: A targeted data extraction system for mobile devices. In: Peterson, G., Shenoi, S. (eds.) Advances in Digital Forensics XV. DigitalForensics 2019. IFIPAICT, vol. 569, pp. 73\u2013100. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-28752-8_5"},{"key":"22_CR39","doi-asserted-by":"publisher","unstructured":"Lim, S., Johan, A., Daud, P., Ismail, N.: Dropbox forensics: forensic analysis of a cloud storage service. Int. J. Eng. Trends Technol. 45\u201349. https:\/\/doi.org\/10.14445\/22315381\/cati3p207","DOI":"10.14445\/22315381\/cati3p207"},{"key":"22_CR40","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/978-3-319-73450-7_11","volume-title":"Proceedings of the International Conference on Information Technology & Systems (ICITS 2018)","author":"JK Alhassan","year":"2018","unstructured":"Alhassan, J.K., Oguntoye, R.T., Misra, S., Adewumi, A., Maskeli\u016bnas, R., Dama\u0161evi\u010dius, R.: Comparative evaluation of mobile forensic tools. In: Rocha, \u00c1., Guarda, T. (eds.) ICITS 2018. AISC, vol. 721, pp. 105\u2013114. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-73450-7_11"},{"key":"22_CR41","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1007\/978-3-030-73050-5_53","volume-title":"Hybrid Intelligent Systems","author":"JB Awotunde","year":"2021","unstructured":"Awotunde, J.B., Ogundokun, R.O., Misra, S., Adeniyi, E.A., Sharma, M.M.: Blockchain-based framework for secure transaction in mobile banking platform. In: Abraham, A., Hanne, T., Castillo, O., Gandhi, N., Nogueira Rios, T., Hong, T.-P. (eds.) HIS 2020. AISC, vol. 1375, pp. 525\u2013534. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-73050-5_53"},{"issue":"3","key":"22_CR42","doi-asserted-by":"publisher","first-page":"1008","DOI":"10.18517\/ijaseit.10.3.9363","volume":"10","author":"G Satrya","year":"2020","unstructured":"Satrya, G., Kurniawan, F.: A novel android memory forensics for discovering remnant data. Int. J. Adv. Sci. Eng. Inf. Technol. 10(3), 1008 (2020). https:\/\/doi.org\/10.18517\/ijaseit.10.3.9363","journal-title":"Int. J. Adv. Sci. Eng. Inf. Technol."},{"key":"22_CR43","doi-asserted-by":"publisher","unstructured":"Rahayu, S., Robiah, Y., Sahib, S., Hassan, N., Abdollah, M., Zainal Abidin, Z.: Traceability in digital forensic investigation process. In: 2011 IEEE Conference on Open Systems, ICOS 2011, pp. 101\u2013106 (2011). https:\/\/doi.org\/10.1109\/ICOS.2011.6079259","DOI":"10.1109\/ICOS.2011.6079259"},{"key":"22_CR44","unstructured":"Kebande, V., Venter, H.: Obfuscating a cloud-based botnet towards digital forensic readiness. In: ICCWS 2015-The Proceedings of the 10th International Conference on Cyber Warfare and Security, p. 434. Academic Conferences Limited (2015)"},{"key":"22_CR45","unstructured":"Kebande, V., Venter, H.: Towards a model for characterizing potential digital evidence in the cloud environment during digital forensic readiness process. In: ICCSM 2015\u20133rd International Conference on Cloud Security and Management, p. 151. Academic Conferences and Publishing Limited (2015)"},{"key":"22_CR46","unstructured":"Selamat, S., Sahib, S., Hafeizah, N., Yusof, R., Abdollah, M.: A forensic traceability index in digital forensic investigation (2013)"},{"issue":"5","key":"22_CR47","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/MIS.2020.3020008","volume":"36","author":"S Grigaliunas","year":"2021","unstructured":"Grigaliunas, S., Toldinas, J., Venckauskas, A.: Digital evidence object model for situation awareness and decision making in digital forensics investigation. IEEE Intell. Syst. 36(5), 39\u201348 (2021). https:\/\/doi.org\/10.1109\/MIS.2020.3020008","journal-title":"IEEE Intell. Syst."}],"container-title":["Communications in Computer and Information Science","Informatics and Intelligent Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-95630-1_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T18:07:36Z","timestamp":1649095656000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-95630-1_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030956295","9783030956301"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-95630-1_22","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"23 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIIA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Informatics and Intelligent Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ota","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nigeria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 November 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciia2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.iciaconference.com\/home","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"108","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}