{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T04:50:25Z","timestamp":1772859025110,"version":"3.50.1"},"publisher-location":"Cham","reference-count":61,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031434006","type":"print"},{"value":"9783031434013","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-43401-3_7","type":"book-chapter","created":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T19:03:00Z","timestamp":1693854180000},"page":"104-120","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Embracing XR System Without Compromising on Security and Privacy"],"prefix":"10.1007","author":[{"given":"Rebecca","family":"Acheampong","sequence":"first","affiliation":[]},{"given":"Titus Constantin","family":"Balan","sequence":"additional","affiliation":[]},{"given":"Dorin-Mircea","family":"Popovici","sequence":"additional","affiliation":[]},{"given":"Alexandre","family":"Rekeraho","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,5]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","unstructured":"Serras, M., Garc\u00eda-Sardi\u00f1a, L., Sim\u00f5es, B., \u00c1lvarez, H., Arambarri, J.: Dialogue enhanced extended reality: interactive system for the operator 4.0. Appl. Sci. 10(11), 3960 (2020). https:\/\/doi.org\/10.3390\/app10113960","DOI":"10.3390\/app10113960"},{"key":"7_CR2","unstructured":"Giaretta, A.: Security and privacy in virtual reality \u2013 a literature survey. arXiv, 20 May 2022. http:\/\/arxiv.org\/abs\/2205.00208. Accessed 03 May 2023"},{"key":"7_CR3","unstructured":"Morrow, M.M.M.J.: The IEEE Global Initiative on Ethics of Extended Reality (XR) Report\u2013Extended Reality (XR) and the Erosion of Anonymity and Privacy. IEEE Xplore, p. 24 (2021)"},{"key":"7_CR4","unstructured":"MacPherson, R.: Wearable technology is helping us amplify the power of our workforce"},{"key":"7_CR5","unstructured":"HoloLens 2 powers faster fixes for Mercedes-Benz USA. https:\/\/iot-automotive.news\/hololens-2-powers-faster-fixes-for-mercedes-benz-usa\/. Accessed 03 May 2023"},{"key":"7_CR6","unstructured":"Microsoft Customer Story-L\u2019Or\u00e9al is revolutionizing work with Dynamics 365 Remote Assist on HoloLens 2. https:\/\/customers.microsoft.com\/en-us\/story\/853016-loreal-retailers-dynamics-365-hololens. Accessed 03 May 2023"},{"key":"7_CR7","unstructured":"Chukwunonso, A.G., Njoku, J.N., Lee, J.-M., Kim, D.-S.: Security in metaverse: a closer look"},{"key":"7_CR8","doi-asserted-by":"publisher","unstructured":"Yang, G., Xu, M.: Research on network architecture and communication protocol of network virtual reality based on image rendering. IOP Conf. Ser. Mater. Sci. Eng. 740(1), 012119 (2020). https:\/\/doi.org\/10.1088\/1757-899X\/740\/1\/012119","DOI":"10.1088\/1757-899X\/740\/1\/012119"},{"key":"7_CR9","unstructured":"Virtual Reality Security and Privacy - XR Today. https:\/\/www.xrtoday.com\/virtual-reality\/virtual-reality-security-and-privacy\/.  Accessed 13 May 2023"},{"key":"7_CR10","unstructured":"The Dark Version of Metaverse can Strip you off Your Identity. https:\/\/www.analyticsinsight.net\/the-dark-version-of-metaverse-can-strip-you-off-your-identity\/. Accessed 13 May 2023"},{"key":"7_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103127","volume":"128","author":"S Qamar","year":"2023","unstructured":"Qamar, S., Anwar, Z., Afzal, M.: A systematic threat analysis and defense strategies for the metaverse and extended reality systems. Comput. Secur. 128, 103127 (2023). https:\/\/doi.org\/10.1016\/j.cose.2023.103127","journal-title":"Comput. Secur."},{"key":"7_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102951","volume":"124","author":"B Odeleye","year":"2023","unstructured":"Odeleye, B., Loukas, G., Heartfield, R., Sakellari, G., Panaousis, E., Spyridonis, F.: Virtually secure: a taxonomic assessment of cybersecurity challenges in virtual reality environments. Comput. Secur. 124, 102951 (2023). https:\/\/doi.org\/10.1016\/j.cose.2022.102951","journal-title":"Comput. Secur."},{"key":"7_CR13","unstructured":"Bao, T.,  Ok, H.: Secure augmented reality (AR) for telehealth and emergency medical services (EMS): a survey, p. 7, July 2021"},{"key":"7_CR14","doi-asserted-by":"publisher","DOI":"10.3389\/frvir.2022.974652","volume":"3","author":"J Lin","year":"2022","unstructured":"Lin, J., Latoschik, M.E.: Digital body, identity and privacy in social virtual reality: a systematic review. Front. Virtual Real. 3, 974652 (2022). https:\/\/doi.org\/10.3389\/frvir.2022.974652","journal-title":"Front. Virtual Real."},{"key":"7_CR15","unstructured":"O\u2019Hagan, J., et al.: Privacy-enhancing technology and everyday augmented reality: understanding bystanders\u2019 varying needs for awareness and consent"},{"key":"7_CR16","unstructured":"Lebeck, K.: Security and privacy for emerging augmented reality technologies (2019)"},{"key":"7_CR17","doi-asserted-by":"publisher","unstructured":"Steed, A., et al.: Evaluating immersive experiences during Covid-19 and beyond. Interactions 27(4), 62\u201367 (2020). https:\/\/doi.org\/10.1145\/3406098","DOI":"10.1145\/3406098"},{"key":"7_CR18","unstructured":"XR in Government and Public Sector | Vection Technologies. https:\/\/vection-technologies.com\/solutions\/industries\/public-sector\/. Accessed 11 July 2023"},{"key":"7_CR19","unstructured":"Ane, B.K., Roller, D.: Ubiquitous virtual reality: the state-of-the-art. IJCSMC 8(7), 11 (2019)"},{"key":"7_CR20","doi-asserted-by":"publisher","unstructured":"O'Hagan, J., et al.: Privacy-enhancing technology and everyday augmented reality: understanding bystanders\u2019 varying needs for awareness and consent. In: Proceedings of the ACM Interactive, Mobile Wearable Ubiquitous Technologies, vol. 6, no. 4, Article no. 177, December 2022, 35 p. (2023). https:\/\/doi.org\/10.1145\/3569501. Accessed 1 July 2023","DOI":"10.1145\/3569501"},{"key":"7_CR21","doi-asserted-by":"publisher","first-page":"1016300","DOI":"10.3389\/fpsyg.2022.1016300","volume":"13","author":"X Zhang","year":"2022","unstructured":"Zhang, X., Chen, Y., Hu, L., Wang, Y.: The metaverse in education: definition, framework, features, potential applications, challenges, and future research topics. Front. Psychol. 13, 1016300 (2022). https:\/\/doi.org\/10.3389\/fpsyg.2022.1016300","journal-title":"Front. Psychol."},{"key":"7_CR22","unstructured":"New Infographic Highlights XR Technology Data Flows and Privacy Risks - Future of Privacy Forum. https:\/\/fpf.org\/blog\/new-infographic-highlights-xr-technology-data-flows-and-privacy-risks\/.  Accessed 08 May 2023"},{"key":"7_CR23","doi-asserted-by":"publisher","unstructured":"Shi, C., et al.: Face-mic: inferring live speech and speaker identity via subtle facial dynamics captured by AR\/VR motion sensors. In: Proceedings of the 27th Annual International Conference on Mobile Computing and Networking, New Orleans Louisiana, pp. 478\u2013490. ACM, October 2021. https:\/\/doi.org\/10.1145\/3447993.3483272","DOI":"10.1145\/3447993.3483272"},{"key":"7_CR24","unstructured":"Rawson, A.: White Paper | Perceptual Computing: Inflection Point for Embedded Applications, p. 7"},{"key":"7_CR25","doi-asserted-by":"publisher","unstructured":"Gulhane, A., et al.: Security, privacy and safety risk assessment for virtual reality learning environment applications. In: 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, pp. 1\u20139. IEEE, January 2019. https:\/\/doi.org\/10.1109\/CCNC.2019.8651847","DOI":"10.1109\/CCNC.2019.8651847"},{"key":"7_CR26","unstructured":"Cybersecurity: Will AR & VR Open New Doors for Security and Privacy Challenges? https:\/\/www.bbntimes.com\/technology\/cybersecurity-will-ar-vr-open-new-doors-for-security-and-privacy-challenges. Accessed 12 May 2023"},{"key":"7_CR27","unstructured":"Viswanathan, K., Yazdinejad, A.: Security considerations for virtual reality systems. arXiv, 23 January 2022. http:\/\/arxiv.org\/abs\/2201.02563. Accessed 12 May 2023"},{"key":"7_CR28","unstructured":"Security and Privacy research lab, University of Washington: 2019 Industry-Academia Summit On Mixed Reality Security, Privacy, and Safety. Industry-Academia Summit (2019)"},{"key":"7_CR29","unstructured":"Dick, E.: Balancing User Privacy and Innovation in Augmented and Virtual Reality. Information Technology (2021)"},{"issue":"2","key":"7_CR30","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1109\/TDSC.2019.2907942","volume":"18","author":"P Casey","year":"2021","unstructured":"Casey, P., Baggili, I., Yarramreddy, A.: Immersive virtual reality attacks and the human joystick. IEEE Trans. Dependable Secur Comput. 18(2), 550\u2013562 (2021). https:\/\/doi.org\/10.1109\/TDSC.2019.2907942","journal-title":"IEEE Trans. Dependable Secur Comput."},{"key":"7_CR31","unstructured":"Alspach, K.: Data integrity cyberattacks are an emerging security threat - Protocol, protocol, 22 August 2022. https:\/\/www.protocol.com\/enterprise\/data-integrity-security-cyberattacks-threat. Accessed 11 July 2023"},{"key":"7_CR32","unstructured":"Lake, J.: Hey, you stole my avatar!: virtual reality and its risks to identity protection. Emory Law J. 69"},{"key":"7_CR33","unstructured":"How Underground Groups Use Stolen Identities and Deepfakes. https:\/\/www.trendmicro.com\/en_us\/research\/22\/i\/how-underground-groups-use-stolen-identities-and-deepfakes.html. Accessed 15 May 2023"},{"key":"7_CR34","doi-asserted-by":"publisher","unstructured":"Langfinger, M., Schneider, M., Stricker, D., Schotten, H.D.: Addressing security challenges in industrial augmented reality systems. In: 2017 IEEE 15th International Conference on Industrial Informatics (INDIN), Emden, pp. 299\u2013304. IEEE, July 2017. https:\/\/doi.org\/10.1109\/INDIN.2017.8104789","DOI":"10.1109\/INDIN.2017.8104789"},{"key":"7_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102923","volume":"127","author":"M Vondr\u00e1\u010dek","year":"2023","unstructured":"Vondr\u00e1\u010dek, M., Baggili, I., Casey, P., Mekni, M.: Rise of the metaverse\u2019s immersive virtual reality malware and the man-in-the-room attack & defenses. Comput. Secur. 127, 102923 (2023). https:\/\/doi.org\/10.1016\/j.cose.2022.102923","journal-title":"Comput. Secur."},{"key":"7_CR36","unstructured":"AR Security & VR Security. https:\/\/usa.kaspersky.com\/resource-center\/threats\/security-and-privacy-risks-of-ar-and-vr. Accessed 12 May 2023"},{"issue":"12","key":"7_CR37","doi-asserted-by":"publisher","first-page":"1142","DOI":"10.1111\/j.1553-2712.1997.tb03697.x","volume":"4","author":"EJ Mlinek","year":"1997","unstructured":"Mlinek, E.J., Pierce, J.: Confidentiality and privacy breaches in a university hospital emergency department. Acad. Emerg. Med. 4(12), 1142\u20131146 (1997). https:\/\/doi.org\/10.1111\/j.1553-2712.1997.tb03697.x","journal-title":"Acad. Emerg. Med."},{"issue":"4","key":"7_CR38","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/S0749-3797(99)00024-0","volume":"16","author":"D O\u2019Brien","year":"1999","unstructured":"O\u2019Brien, D.: Privacy, confidentiality, and security in information systems of state health agencies. Am. J. Prev. Med. 16(4), 351\u2013358 (1999). https:\/\/doi.org\/10.1016\/S0749-3797(99)00024-0","journal-title":"Am. J. Prev. Med."},{"key":"7_CR39","unstructured":"5 Damaging Consequences of a Data Breach | MetaCompliance. https:\/\/www.metacompliance.com\/blog\/data-breaches\/5-damaging-consequences-of-a-data-breach. Accessed 13 May 2023"},{"key":"7_CR40","unstructured":"Metaverse or Metaworse? Cybersecurity Threats Against the Internet of Experiences"},{"key":"7_CR41","unstructured":"Deepfake Types, Examples, Prevention. https:\/\/www.spiceworks.com\/it-security\/cyber-risk-management\/articles\/what-is-deepfake\/. Accessed 15 May 2023"},{"key":"7_CR42","unstructured":"What is digital identity? | Definition from TechTarget. https:\/\/www.techtarget.com\/whatis\/definition\/digital-identity.  Accessed 14 May 2023"},{"key":"7_CR43","unstructured":"What is identity theft? Definition from SearchSecurity. https:\/\/www.techtarget.com\/searchsecurity\/definition\/identity-theft. Accessed 14 May 2023"},{"key":"7_CR44","doi-asserted-by":"publisher","first-page":"5","DOI":"10.3389\/fict.2019.00005","volume":"6","author":"J Happa","year":"2019","unstructured":"Happa, J., Glencross, M., Steed, A.: Cyber Security threats and challenges in collaborative mixed-reality. Front. ICT 6, 5 (2019). https:\/\/doi.org\/10.3389\/fict.2019.00005","journal-title":"Front. ICT"},{"key":"7_CR45","unstructured":"Koon, J.: Design and Security Challenges for VR, Semiconductor Engineering, 10 August 2022. https:\/\/semiengineering.com\/design-and-security-challenges-for-vr\/. Accessed 08 May 2023"},{"key":"7_CR46","unstructured":"Roesner, F., Kohno, T.: Security and privacy for augmented reality: our 10-year retrospective. In: VR4Sec: 1st International Workshop on Security for XR and XR for Security. https:\/\/par.nsf.gov\/biblio\/10312790. Accessed 1 July 2023"},{"key":"7_CR47","unstructured":"Lebeck, K.: Security and privacy for emerging augmented reality technologies"},{"key":"7_CR48","doi-asserted-by":"publisher","first-page":"5","DOI":"10.3389\/frobt.2019.00005","volume":"6","author":"T Piumsomboon","year":"2019","unstructured":"Piumsomboon, T., Dey, A., Ens, B., Lee, G., Billinghurst, M.: The effects of sharing awareness cues in collaborative mixed reality. Front. Robot. AI 6, 5 (2019). https:\/\/doi.org\/10.3389\/frobt.2019.00005","journal-title":"Front. Robot. AI"},{"key":"7_CR49","unstructured":"State separation and isolation | Microsoft Learn. https:\/\/learn.microsoft.com\/en-us\/hololens\/security-state-separation-isolation. Accessed 15 May 2023"},{"key":"7_CR50","doi-asserted-by":"publisher","unstructured":"Gharsallaoui, R., Hamdi, M., Kim, T.-H.: A novel privacy technique for augmented reality cloud gaming based on image authentication. In: 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), Valencia, Spain, pp. 252\u2013257. IEEE, June 2017. https:\/\/doi.org\/10.1109\/IWCMC.2017.7986295","DOI":"10.1109\/IWCMC.2017.7986295"},{"issue":"5","key":"7_CR51","doi-asserted-by":"publisher","first-page":"1041","DOI":"10.1109\/TMM.2016.2639380","volume":"19","author":"YA Sekhavat","year":"2017","unstructured":"Sekhavat, Y.A.: Privacy preserving cloth try-on using mobile augmented reality. IEEE Trans. Multimedia 19(5), 1041\u20131049 (2017). https:\/\/doi.org\/10.1109\/TMM.2016.2639380","journal-title":"IEEE Trans. Multimedia"},{"issue":"6","key":"7_CR52","doi-asserted-by":"publisher","first-page":"703","DOI":"10.2501\/IJMR-2017-050","volume":"59","author":"M Goddard","year":"2017","unstructured":"Goddard, M.: The EU general data protection regulation (GDPR): European regulation that has a global impact. Int. J. Mark. Res. 59(6), 703\u2013705 (2017). https:\/\/doi.org\/10.2501\/IJMR-2017-050","journal-title":"Int. J. Mark. Res."},{"key":"7_CR53","unstructured":"Reality Check: How is the EU ensuring data protection in XR Technologies? \u2014 The Digital Constitutionalist. https:\/\/digi-con.org\/reality-check-how-is-the-eu-ensuring-data-protection-in-xr-technologies\/. Accessed 12 May 2023"},{"key":"7_CR54","doi-asserted-by":"publisher","DOI":"10.3389\/frvir.2021.697667","volume":"2","author":"JJ Lee","year":"2021","unstructured":"Lee, J.J., Hu-Au, E.: E3XR: an analytical framework for ethical, educational and eudaimonic XR design. Front. Virtual Real. 2, 697667 (2021). https:\/\/doi.org\/10.3389\/frvir.2021.697667","journal-title":"Front. Virtual Real."},{"key":"7_CR55","unstructured":"The ethical dilemmas of virtual reality application in entertainment. In: 2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), New York, NY, USA. IEEE (2019)"},{"key":"7_CR56","unstructured":"Trimananda, R., Le, H., Cui, H., Ho, J.T., Shuba, A., Markopoulou, A.: OVRseen: auditing network traffic and privacy policies in oculus VR. arXiv, 19 November 2021. http:\/\/arxiv.org\/abs\/2106.05407. Accessed 12 May 2023"},{"key":"7_CR57","unstructured":"The Metaverse Standards Forum. https:\/\/metaverse-standards.org\/. Accessed 13 May 2023"},{"key":"7_CR58","unstructured":"About - XR Association. https:\/\/xra.org\/about\/. Accessed 13 May 2023"},{"key":"7_CR59","unstructured":"The XRSI Definitions of Extended Reality (XR): XR Data Classification Framework Public Working Group, California, USA"},{"key":"7_CR60","unstructured":"XRSI \u2013 XR Safety Initiative | Helping Build Safe Immersive Environments. https:\/\/xrsi.org\/. Accessed 13 May 2023"},{"key":"7_CR61","unstructured":"Adams, D., Bah, A., Barwulor, C., Musabay, N., Pitkin, K., Redmiles, E.M.: Ethics emerging: the story of privacy and security perceptions in virtual reality. In: Proceedings of the Fourteenth USENIX Conference on Usable Privacy and Security (SOUPS 2018), pp. 443\u2013458. USENIX Association, USA (2018)"}],"container-title":["Lecture Notes in Computer Science","Extended Reality"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-43401-3_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,29]],"date-time":"2024-01-29T19:04:56Z","timestamp":1706555096000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-43401-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031434006","9783031434013"],"references-count":61,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-43401-3_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"5 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"XR Salento","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Extended Reality","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lecce","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"avr2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.xrsalento.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"OCS - Unisalento Conferences","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"97","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"60","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"62% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}