{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T21:35:02Z","timestamp":1775597702252,"version":"3.50.1"},"publisher-location":"Cham","reference-count":63,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030969561","type":"print"},{"value":"9783030969578","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-96957-8_36","type":"book-chapter","created":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T14:04:35Z","timestamp":1645538675000},"page":"425-444","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["The Origin and Value of Disagreement Among Data Labelers: A Case Study of Individual Differences in Hate Speech Annotation"],"prefix":"10.1007","author":[{"given":"Yisi","family":"Sang","sequence":"first","affiliation":[]},{"given":"Jeffrey","family":"Stanton","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,23]]},"reference":[{"key":"36_CR1","doi-asserted-by":"crossref","unstructured":"Aggarwal, A., Maurya, K., Chaudhary, A.: Comparative study for predicting the severity of cyberbullying across multiple social media platforms. In: 2020 4th International Conference on Intelligent Computing and Control Systems (ICICCS), pp. 871\u2013877 (2020)","DOI":"10.1109\/ICICCS48265.2020.9121046"},{"key":"36_CR2","unstructured":"Assimakopoulos, S., Muskat, R.V., van der Plas, L., Gatt, A.: Annotating for hate speech: the MaNeCo corpus and some input from critical discourse analysis. In: Proceedings of the 12th Language Resources and Evaluation Conference, pp. 5088\u20135097 (2020). https:\/\/www.aclweb.org\/anthology\/2020.lrec-1.626. Accessed 23 Sept 2020"},{"key":"36_CR3","unstructured":"Awal, Md.R., Cao, R., Lee, R.K.-W., Mitrovi\u0107, S.: On analyzing annotation consistency in online abusive behavior datasets. arXiv:2006.13507 [cs] (2020). http:\/\/arxiv.org\/abs\/2006.13507. Accessed 10 Aug 2020"},{"key":"36_CR4","doi-asserted-by":"crossref","unstructured":"Basile, V., et al.: Semeval-2019 task 5: multilingual detection of hate speech against immigrants and women in twitter. In: Proceedings of the 13th International Workshop on Semantic Evaluation, pp. 54\u201363 (2019)","DOI":"10.18653\/v1\/S19-2007"},{"key":"36_CR5","doi-asserted-by":"crossref","unstructured":"Beaujean, A.A.: Latent Variable Modeling Using R: A Step-by-Step Guide. Routledge, London (2014)","DOI":"10.4324\/9781315869780"},{"key":"36_CR6","unstructured":"Benesch, S.: Dangerous speech: a proposal to prevent group violence. In: Voices That Poison: Dangerous Speech Project (2012)"},{"key":"36_CR7","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-319-73706-5_14","volume-title":"Language Technologies for the Challenges of the Digital Age","author":"D Benikova","year":"2018","unstructured":"Benikova, D., Wojatzki, M., Zesch, T.: What does this imply? Examining the impact of implicitness on the perception of hate speech. In: Rehm, G., Declerck, T. (eds.) GSCL 2017. LNCS (LNAI), vol. 10713, pp. 171\u2013179. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-73706-5_14"},{"key":"36_CR8","unstructured":"Boyatzis, R.E.: Transforming Qualitative Information: Thematic Analysis and Code Development. Sage, Thousand Oaks (1998)"},{"key":"36_CR9","doi-asserted-by":"crossref","unstructured":"Chancellor, S., Kalantidis, Y., Pater, J.A., De Choudhury, M., Shamma, D.A.: Multimodal classification of moderated online pro-eating disorder content. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 3213\u20133226 (2017)","DOI":"10.1145\/3025453.3025985"},{"key":"36_CR10","doi-asserted-by":"crossref","unstructured":"Chandrasekharan, E., Samory, M., Srinivasan, A., Gilbert, E.: The bag of communities: identifying abusive behavior online with preexisting Internet data. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 3175\u20133187 (2017)","DOI":"10.1145\/3025453.3026018"},{"key":"36_CR11","doi-asserted-by":"publisher","unstructured":"Chen, Y., Zhou, Y., Zhu, S., Xu, H.: Detecting offensive language in social media to protect adolescent online safety. In: 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Conference on Social Computing, pp. 71\u201380 (2012). https:\/\/doi.org\/10.1109\/SocialCom-PASSAT.2012.55","DOI":"10.1109\/SocialCom-PASSAT.2012.55"},{"issue":"1","key":"36_CR12","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1037\/0021-9010.78.1.98","volume":"78","author":"JM Cortina","year":"1993","unstructured":"Cortina, J.M.: What is coefficient alpha? An examination of theory and applications. J. Appl. Psychol. 78(1), 98 (1993)","journal-title":"J. Appl. Psychol."},{"key":"36_CR13","doi-asserted-by":"crossref","unstructured":"Cowan, G., Cowan, G.: Empathy, ways of knowing, and interdependence as mediators of gender differences in attitudes toward hate speech and freedom of speech. Psychol. Women Q. 300\u2013308 (2003)","DOI":"10.1111\/1471-6402.00110"},{"issue":"4","key":"36_CR14","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1111\/j.1559-1816.1996.tb01854.x","volume":"26","author":"G Cowan","year":"1996","unstructured":"Cowan, G., Hodge, C.: Judgments of hate speech: the effects of target group, publicness, and behavioral responses of the target. J. Appl. Soc. Psychol. 26(4), 355\u2013374 (1996)","journal-title":"J. Appl. Soc. Psychol."},{"issue":"2","key":"36_CR15","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1111\/1540-4560.00259","volume":"58","author":"G Cowan","year":"2002","unstructured":"Cowan, G., Resendez, M., Marshall, E., Quist, R.: Hate speech and constitutional protection: priming values of equality and freedom. J. Soc. Issues 58(2), 247\u2013263 (2002)","journal-title":"J. Soc. Issues"},{"key":"36_CR16","doi-asserted-by":"crossref","unstructured":"Davidson, T., Bhattacharya, D., Weber, I.: Racial bias in hate speech and abusive language detection datasets. arXiv:1905.12516 [cs] 2019. http:\/\/arxiv.org\/abs\/1905.12516. Accessed 10 May 2020","DOI":"10.18653\/v1\/W19-3504"},{"key":"36_CR17","first-page":"133","volume":"17","author":"R Delgado","year":"1982","unstructured":"Delgado, R.: Words that wound: a tort action for racial insults, epithets, and name-calling. Harv. CR-CLL Rev. 17, 133 (1982)","journal-title":"Harv. CR-CLL Rev."},{"key":"36_CR18","doi-asserted-by":"publisher","unstructured":"Farrell, T., Fernandez, M., Novotny, J., Alani, H.: Exploring Misogyny across the Manosphere in Reddit. In: Proceedings of the 10th ACM Conference on Web Science - WebSci 2019, pp. 87\u201396 (2019). https:\/\/doi.org\/10.1145\/3292522.3326045","DOI":"10.1145\/3292522.3326045"},{"key":"36_CR19","doi-asserted-by":"crossref","unstructured":"Founta, A.-M., et al.: Large scale crowdsourcing and characterization of twitter abusive behavior. arXiv preprint arXiv:1802.00393 (2018)","DOI":"10.1609\/icwsm.v12i1.14991"},{"issue":"2","key":"36_CR20","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1093\/poq\/nfp031","volume":"73","author":"M Galesic","year":"2009","unstructured":"Galesic, M., Bosnjak, M.: Effects of questionnaire length on participation and indicators of response quality in a web survey. Publ. Opin. Q. 73(2), 349\u2013360 (2009)","journal-title":"Publ. Opin. Q."},{"key":"36_CR21","first-page":"42","volume":"17","author":"J Grimmelmann","year":"2015","unstructured":"Grimmelmann, J.: The virtues of moderation. Yale JL & Tech. 17, 42 (2015)","journal-title":"Yale JL & Tech."},{"key":"36_CR22","doi-asserted-by":"publisher","unstructured":"Hewitt, S., Tiropanis, T., Bokhove, C.: The problem of identifying misogynist language on Twitter (and other online social spaces). In: Proceedings of the 8th ACM Conference on Web Science - WebSci 2016, pp. 333\u2013335 (2016). https:\/\/doi.org\/10.1145\/2908131.2908183","DOI":"10.1145\/2908131.2908183"},{"key":"36_CR23","unstructured":"Hosseini, H., Kannan, S., Zhang, B., Poovendran, R.: Deceiving Google\u2019s perspective API built for detecting toxic comments. arXiv:1702.08138 [cs] (2017). http:\/\/arxiv.org\/abs\/1702.08138. Accessed 9 July 2020"},{"key":"36_CR24","unstructured":"Kennedy, B., et al.: The Gab Hate Corpus: A collection of 27k posts annotated for hate speech (2020)"},{"issue":"5","key":"36_CR25","doi-asserted-by":"publisher","first-page":"102643","DOI":"10.1016\/j.ipm.2021.102643","volume":"58","author":"J Koco\u0144","year":"2021","unstructured":"Koco\u0144, J., Figas, A., Gruza, M., Puchalska, D., Kajdanowicz, T., Kazienko, P.: Offensive, aggressive, and hate speech analysis: from data-centric to human-centered approach. Inf. Process. Manag. 58(5), 102643 (2021). https:\/\/doi.org\/10.1016\/j.ipm.2021.102643","journal-title":"Inf. Process. Manag."},{"key":"36_CR26","unstructured":"Kumar, R., Reganti, A.N., Bhatia, A., Maheshwari, T.: Aggression-annotated corpus of Hindi-English code-mixed data. arXiv preprint arXiv:1803.09402 (2018)"},{"issue":"2","key":"36_CR27","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1207\/S15326926CLP0602_2","volume":"6","author":"L Leets","year":"2001","unstructured":"Leets, L.: Responses to internet hate sites: is speech too free in cyberspace? Commun. Law Policy 6(2), 287\u2013317 (2001)","journal-title":"Commun. Law Policy"},{"key":"36_CR28","doi-asserted-by":"crossref","unstructured":"Lucas, E., Alm, C.O., Bailey, R.: Understanding human and predictive moderation of online science discourse. In: 2019 IEEE Western New York Image and Signal Processing Workshop (WNYISPW), pp. 1\u20135 (2019)","DOI":"10.1109\/WNYIPW.2019.8923109"},{"key":"36_CR29","unstructured":"Marwick, A.E., Miller, R.: Online harassment, defamation, and hateful speech: a primer of the legal landscape. Fordham Center on Law and Information Policy Report, p. 2 (2014)"},{"issue":"8","key":"36_CR30","doi-asserted-by":"publisher","first-page":"2320","DOI":"10.2307\/1289306","volume":"87","author":"MJ Matsuda","year":"1989","unstructured":"Matsuda, M.J.: Public response to racist speech: considering the victim\u2019s story. Mich. Law Rev. 87(8), 2320\u20132381 (1989)","journal-title":"Mich. Law Rev."},{"key":"36_CR31","unstructured":"Matsuda, M.J., Lawrence, C.R., Delgado, R., Crenshaw, K.W.: Words that Wound. Westview, Boulder (1993)"},{"issue":"1","key":"36_CR32","doi-asserted-by":"publisher","first-page":"92","DOI":"10.2307\/3096915","volume":"39","author":"K McClelland","year":"1992","unstructured":"McClelland, K., Hunter, C.: The perceived seriousness of racial harassment. Soc. Probl. 39(1), 92\u2013107 (1992)","journal-title":"Soc. Probl."},{"key":"36_CR33","unstructured":"McGillicuddy, A.R., Bernard, J.-G., Cranefield, J.A.: Controlling bad behavior in online communities: an examination of moderation work (2016)"},{"key":"36_CR34","doi-asserted-by":"crossref","unstructured":"Mohan, S., Guha, A., Harris, M., Popowich, F., Schuster, A., Priebe, C.: The impact of toxic language on the health of reddit communities. In: Canadian Conference on Artificial Intelligence, pp. 51\u201356 (2017)","DOI":"10.1007\/978-3-319-57351-9_6"},{"key":"36_CR35","unstructured":"Moran, M.: Talking about hate speech: a rhetorical analysis of American and Canadian approaches to the regulation of hate speech. Wis. L. Rev. 1425 (1994)"},{"key":"36_CR36","doi-asserted-by":"crossref","unstructured":"Muller, M., et al.: How data science workers work with data: discovery, capture, curation, design, creation. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, pp. 1\u201315 (2019)","DOI":"10.1145\/3290605.3300356"},{"key":"36_CR37","doi-asserted-by":"crossref","unstructured":"Netemeyer, R.G., Bearden, W.O., Sharma, S.: Scaling Procedures: Issues and Applications. Sage Publications, Thousand Oaks (2003)","DOI":"10.4135\/9781412985772"},{"key":"36_CR38","doi-asserted-by":"crossref","unstructured":"Nobata, C., Tetreault, J., Thomas, A., Mehdad, Y., Chang, Y.: Abusive language detection in online user content. In: Proceedings of the 25th International Conference on World Wide Web, pp. 145\u2013153 (2016)","DOI":"10.1145\/2872427.2883062"},{"key":"36_CR39","doi-asserted-by":"crossref","unstructured":"Oostdijk, N., van Halteren, H.: N-gram-based recognition of threatening tweets. In: International Conference on Intelligent Text Processing and Computational Linguistics, pp. 183\u2013196 (2013)","DOI":"10.1007\/978-3-642-37256-8_16"},{"issue":"4","key":"36_CR40","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1111\/j.1070-3535.2005.00405.x","volume":"12","author":"B Parekh","year":"2006","unstructured":"Parekh, B.: Hate speech. Publ. Policy Res. 12(4), 213\u2013223 (2006). https:\/\/doi.org\/10.1111\/j.1070-3535.2005.00405.x","journal-title":"Publ. Policy Res."},{"key":"36_CR41","unstructured":"Pohjonen, M.: Extreme Speech Online: An Anthropological Critique of Hate Speech Debates, p. 19 (2017)"},{"issue":"3","key":"36_CR42","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1080\/00909889909365539","volume":"27","author":"W James Potter","year":"1999","unstructured":"James Potter, W., Levine-Donnerstein, D.: Rethinking validity and reliability in content analysis. J. Appl. Commun. Res. 27(3), 258\u2013284 (1999). https:\/\/doi.org\/10.1080\/00909889909365539","journal-title":"J. Appl. Commun. Res."},{"issue":"7","key":"36_CR43","doi-asserted-by":"publisher","first-page":"e604","DOI":"10.1038\/tp.2015.96","volume":"5","author":"RA Power","year":"2015","unstructured":"Power, R.A., Pluess, M.: Heritability estimates of the Big Five personality traits based on common genetic variants. Transl. Psychiatry 5(7), e604\u2013e604 (2015)","journal-title":"Transl. Psychiatry"},{"issue":"1","key":"36_CR44","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.jrp.2006.02.001","volume":"41","author":"B Rammstedt","year":"2007","unstructured":"Rammstedt, B., John, O.P.: Measuring personality in one minute or less: a 10-item short version of the Big Five Inventory in English and German. J. Res. Pers. 41(1), 203\u2013212 (2007)","journal-title":"J. Res. Pers."},{"key":"36_CR45","unstructured":"Ross, B., Rist, M., Carbonell, G., Cabrera, B., Kurowsky, N., Wojatzki, M.: Measuring the reliability of hate speech annotations: the case of the European refugee crisis. arXiv preprint arXiv:1701.08118 (2017)"},{"key":"36_CR46","doi-asserted-by":"crossref","unstructured":"Rosseel, Y.: Lavaan: an R package for structural equation modeling and more. Version 0.5\u201312 (BETA). J. Stat. Softw. 48(2), 1\u201336 (2012)","DOI":"10.18637\/jss.v048.i02"},{"issue":"2","key":"36_CR47","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1177\/1948550617748728","volume":"9","author":"G Roussos","year":"2018","unstructured":"Roussos, G., Dovidio, J.F.: Hate speech is in the eye of the beholder: the influence of racial attitudes and freedom of speech beliefs on perceptions of racially motivated threats of violence. Soc. Psychol. Person. Sci. 9(2), 176\u2013185 (2018). https:\/\/doi.org\/10.1177\/1948550617748728","journal-title":"Soc. Psychol. Person. Sci."},{"key":"36_CR48","unstructured":"Sanguinetti, M., Poletto, F., Bosco, C., Patti, V., Stranisci, M.: An Italian twitter corpus of hate speech against immigrants. In: Proceedings of the Eleventh International Conference on Language Resources and Evaluation (LREC 2018) (2018)"},{"key":"36_CR49","doi-asserted-by":"publisher","unstructured":"Schmidt, A., Wiegand, M.: A survey on hate speech detection using natural language processing. In: Proceedings of the Fifth International Workshop on Natural Language Processing for Social Media, pp. 1\u201310 (2017). https:\/\/doi.org\/10.18653\/v1\/W17-1101","DOI":"10.18653\/v1\/W17-1101"},{"key":"36_CR50","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2882244","author":"A Sellars","year":"2016","unstructured":"Sellars, A.: Defining hate speech. SSRN Electron. J. (2016). https:\/\/doi.org\/10.2139\/ssrn.2882244","journal-title":"SSRN Electron. J."},{"issue":"1","key":"36_CR51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13278-016-0350-0","volume":"6","author":"M Singh","year":"2016","unstructured":"Singh, M., Bansal, D., Sofat, S.: Behavioral analysis and classification of spammers distributing pornographic content in social media. Soc. Netw. Anal. Min. 6(1), 1\u201318 (2016). https:\/\/doi.org\/10.1007\/s13278-016-0350-0","journal-title":"Soc. Netw. Anal. Min."},{"key":"36_CR52","unstructured":"Van Hee, C., et al.: Detection and fine-grained classification of cyberbullying events. In: International Conference Recent Advances in Natural Language Processing (RANLP), pp. 672\u2013680 (2015)"},{"issue":"6","key":"36_CR53","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2818997","volume":"22","author":"D Wang","year":"2015","unstructured":"Wang, D., Mark, G.: Internet censorship in China: examining user awareness and attitudes. ACM Trans. Comput.-Hum. Interact. (TOCHI) 22(6), 1\u201322 (2015)","journal-title":"ACM Trans. Comput.-Hum. Interact. (TOCHI)"},{"key":"36_CR54","doi-asserted-by":"crossref","unstructured":"Waseem, Z., Davidson, T., Warmsley, D., Weber, I.: Understanding abuse: a typology of abusive language detection subtasks. arXiv:1705.09899 [cs] (2017). http:\/\/arxiv.org\/abs\/1705.09899. Accessed 6 Mar 2020","DOI":"10.18653\/v1\/W17-3012"},{"key":"36_CR55","doi-asserted-by":"crossref","unstructured":"Waseem, Z., Hovy, D.: Hateful symbols or hateful people? Predictive features for hate speech detection on twitter. In: Proceedings of the NAACL Student Research Workshop, pp. 88\u201393 (2016)","DOI":"10.18653\/v1\/N16-2013"},{"issue":"3","key":"36_CR56","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1037\/pspi0000095","volume":"113","author":"MH White II","year":"2017","unstructured":"White II, M.H., Crandall, C.S.: Freedom of racist speech: ego and expressive threats. J. Pers. Soc. Psychol. 113(3), 413 (2017)","journal-title":"J. Pers. Soc. Psychol."},{"key":"36_CR57","unstructured":"Wojatzki, M., Horsmann, T., Gold, D., Zesch, T.: Do women perceive hate differently: examining the relationship between hate speech, gender, and agreement judgments, p. 11 (2018)"},{"key":"36_CR58","doi-asserted-by":"crossref","unstructured":"Xiang, G., Fan, B., Wang, L., Hong, J., Rose, C.: Detecting offensive tweets via topical feature discovery over a large scale twitter corpus. In: Proceedings of the 21st ACM International Conference on Information and Knowledge Management, pp. 1980\u20131984 (2012)","DOI":"10.1145\/2396761.2398556"},{"key":"36_CR59","doi-asserted-by":"crossref","unstructured":"Zampieri, M., Malmasi, S., Nakov, P., Rosenthal, S., Farra, N., Kumar, R.: Predicting the type and target of offensive posts in social media. arXiv preprint arXiv:1902.09666 (2019)","DOI":"10.18653\/v1\/N19-1144"},{"key":"36_CR60","unstructured":"Community Standards. https:\/\/www.facebook.com\/communitystandards\/hate_speech. Accessed 25 Mar 2020"},{"key":"36_CR61","unstructured":"Hateful Conduct Policy. https:\/\/help.twitter.com\/en\/rules-and-policies\/hateful-conduct-policy. Accessed 25 Mar 2020"},{"key":"36_CR62","unstructured":"Home. Optimal Workshop. https:\/\/www.optimalworkshop.com\/. Accessed 14 May 2020"},{"key":"36_CR63","doi-asserted-by":"crossref","unstructured":"Prolific\u2014Online participant recruitment for surveys and market research. https:\/\/www.prolific.co\/. Accessed 17 May 2021","DOI":"10.22233\/20412495.0521.17"}],"container-title":["Lecture Notes in Computer Science","Information for a Better World: Shaping the Global Future"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-96957-8_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,27]],"date-time":"2023-01-27T17:58:18Z","timestamp":1674842298000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-96957-8_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030969561","9783030969578"],"references-count":63,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-96957-8_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"23 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"iConference","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 February 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 March 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iconference2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ischools.org\/iConference","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"ConfTool","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"147","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}