{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T07:16:21Z","timestamp":1763968581123,"version":"3.40.3"},"publisher-location":"Cham","reference-count":53,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031613814"},{"type":"electronic","value":"9783031613821"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-61382-1_7","type":"book-chapter","created":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T01:06:11Z","timestamp":1717203971000},"page":"98-117","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Expert Perspectives on\u00a0Information Security Awareness Programs in\u00a0Medical Care Institutions in\u00a0Germany"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1961-100X","authenticated-orcid":false,"given":"Jan","family":"Tolsdorf","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7863-0622","authenticated-orcid":false,"given":"Luigi","family":"Lo Iacono","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,1]]},"reference":[{"key":"7_CR1","unstructured":"Branchenspezifischer Sicherheitsstandard f\u00fcr die Gesundheitsversorgung im Krankenhaus (2019)"},{"key":"7_CR2","unstructured":"ENISA Threat Landscape 2023. Technical report (2023). https:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape-2023"},{"issue":"3","key":"7_CR3","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1080\/0144929X.2012.708787","volume":"33","author":"J Abawajy","year":"2014","unstructured":"Abawajy, J.: User preference of cyber security awareness delivery methods. Behav. Inf. Technol. 33(3), 237\u2013248 (2014)","journal-title":"Behav. Inf. Technol."},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Abu\u00a0Ali, K., Alyounis, S.: CyberSecurity in healthcare industry. In: Proceedings of the International Conference on Information Technology (ICIT), pp. 695\u2013701 (2021)","DOI":"10.1109\/ICIT52682.2021.9491669"},{"issue":"04","key":"7_CR5","doi-asserted-by":"publisher","first-page":"924","DOI":"10.1055\/s-0041-1735527","volume":"12","author":"D Alhuwail","year":"2021","unstructured":"Alhuwail, D., Al-Jafar, E., Abdulsalam, Y., AlDuaij, S.: Information security awareness and behaviors of health care professionals at public health care facilities. Appl. Clin. Inform. 12(04), 924\u2013932 (2021)","journal-title":"Appl. Clin. Inform."},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-3-030-41568-6_15","volume-title":"Risks and Security of Internet and Systems","author":"S Altamimi","year":"2020","unstructured":"Altamimi, S., Renaud, K., Storer, T.: I do it because they do it\u202f: social-neutralisation in information security practices of Saudi medical interns. In: Kallel, S., Cuppens, F., Cuppens-Boulahia, N., Hadj Kacem, A. (eds.) CRiSIS 2019. LNCS, vol. 12026, pp. 227\u2013243. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-41568-6_15"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Amankwa, E., Loock, M., Kritzinger, E.: A conceptual analysis of information security education, information security training and information security awareness definitions. In: Proceedings of the 9th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 248\u2013252 (2014)","DOI":"10.1109\/ICITST.2014.7038814"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Amro, B.M., Al-Jabari, M.O., Jabareen, H.M., Khader, Y.S., Taweel, A.: Design and development of case studies in security and privacy for health informatics education. In: Proceedings of the 15th IEEE International Conference on Computer Systems and Applications (AICCSA), pp.\u00a01\u20136 (2018)","DOI":"10.1109\/AICCSA.2018.8612876"},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"73","DOI":"10.2147\/JMDH.S183275","volume":"12","author":"MA Arain","year":"2019","unstructured":"Arain, M.A., Tarraf, R., Ahmad, A.: Assessing staff awareness and effectiveness of educational training on IT security and privacy in a large healthcare organization. J. Multidiscip. Healthc. 12, 73\u201381 (2019)","journal-title":"J. Multidiscip. Healthc."},{"issue":"6","key":"7_CR10","doi-asserted-by":"publisher","first-page":"9984","DOI":"10.1007\/s10916-013-9984-x","volume":"37","author":"\u00d6M Ayd\u0131n","year":"2013","unstructured":"Ayd\u0131n, \u00d6.M., Chouseinoglou, O.: Fuzzy assessment of health information system users\u2019 security awareness. J. Med. Syst. 37(6), 9984 (2013)","journal-title":"J. Med. Syst."},{"issue":"5","key":"7_CR11","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/s10916-019-1507-y","volume":"44","author":"SS Bhuyan","year":"2020","unstructured":"Bhuyan, S.S., et al.: Transforming healthcare cybersecurity from reactive to proactive: current status and future recommendations. J. Med. Syst. 44(5), 98 (2020)","journal-title":"J. Med. Syst."},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Branley-Bell, D., Coventry, L., Sillence, E.: Promoting cybersecurity culture change in healthcare. In: Proceedings of the 14th ACM Pervasive Technologies Related to Assistive Environments Conference (PETRA), pp. 544\u2013549 (2021)","DOI":"10.1145\/3453892.3461622"},{"key":"7_CR13","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.maturitas.2018.04.008","volume":"113","author":"L Coventry","year":"2018","unstructured":"Coventry, L., Branley, D.: Cybersecurity in healthcare: a narrative review of trends, threats and ways forward. Maturitas 113, 48\u201352 (2018)","journal-title":"Maturitas"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Coventry, L., et al.: Cyber-risk in healthcare: exploring facilitators and barriers to secure behaviour. In: Proceedings of the 2nd International Conference on HCI for Cybersecurity, Privacy and Trust (HCI-CPT), pp. 105\u2013122 (2020)","DOI":"10.1007\/978-3-030-50309-3_8"},{"issue":"12","key":"7_CR15","doi-asserted-by":"publisher","first-page":"1065","DOI":"10.1016\/j.ijmedinf.2015.09.006","volume":"84","author":"EV Eikey","year":"2015","unstructured":"Eikey, E.V., Murphy, A.R., Reddy, M.C., Xu, H.: Designing for privacy management in hospitals: understanding the gap between user activities and IT staff\u2019s understandings. Int. J. Med. Inform. 84(12), 1065\u20131075 (2015)","journal-title":"Int. J. Med. Inform."},{"key":"7_CR16","unstructured":"ENISA: The new users\u2019 guide: how to raise information security awareness (EN). Report\/Study TP-30-10-582-EN-C. ENISA (2010)"},{"issue":"1","key":"7_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.11648\/j.ajtas.20160501.11","volume":"5","author":"I Etikan","year":"2016","unstructured":"Etikan, I.: Comparison of convenience sampling and purposive sampling. Am. J. Theor. Appl. Stat. 5(1), 1\u20134 (2016)","journal-title":"Am. J. Theor. Appl. Stat."},{"key":"7_CR18","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.ijmedinf.2019.04.019","volume":"127","author":"M Evans","year":"2019","unstructured":"Evans, M., He, Y., Maglaras, L., Yevseyeva, I., Janicke, H.: Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector. Int. J. Med. Inform. 127, 109\u2013119 (2019)","journal-title":"Int. J. Med. Inform."},{"key":"7_CR19","unstructured":"Fabisiak, L., Hyla, T.: Measuring cyber security awareness within groups of medical professionals in Poland. In: Proceedings of the 53rd Hawaii International Conference on System Sciences (HICSS), pp. 3871\u20133880 (2020)"},{"issue":"6","key":"7_CR20","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1016\/j.ijmedinf.2015.01.010","volume":"84","author":"JL Fern\u00e1ndez-Alem\u00e1n","year":"2015","unstructured":"Fern\u00e1ndez-Alem\u00e1n, J.L., S\u00e1nchez-Henarejos, A., Toval, A., S\u00e1nchez-Garc\u00eda, A.B., Hern\u00e1ndez-Hern\u00e1ndez, I., Fernandez-Luque, L.: Analysis of health professional security behaviors in a real clinical setting: an empirical study. Int. J. Med. Inform. 84(6), 454\u2013467 (2015)","journal-title":"Int. J. Med. Inform."},{"key":"7_CR21","unstructured":"Gardner, B., Thomas, V.: Building an Information Security Awareness Program: Defending Against Social Engineering and Technical Threats, 1st edn. (2014)"},{"issue":"2","key":"7_CR22","first-page":"193","volume":"8","author":"A Ghazvini","year":"2017","unstructured":"Ghazvini, A., Shukur, Z.: A framework for an effective information security awareness program in healthcare. Int. J. Adv. Comput. Sci. Appl. 8(2), 193\u2013205 (2017)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"issue":"9","key":"7_CR23","first-page":"236","volume":"9","author":"A Ghazvini","year":"2018","unstructured":"Ghazvini, A., Shukur, Z.: A serious game for healthcare industry: information security awareness training program for hospital universiti Kebangsaan Malaysia. Int. J. Adv. Comput. Sci. Appl. 9(9), 236\u2013245 (2018)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"issue":"2","key":"7_CR24","doi-asserted-by":"publisher","first-page":"327","DOI":"10.3390\/healthcare10020327","volume":"10","author":"F Gioulekas","year":"2022","unstructured":"Gioulekas, F., et al.: A cybersecurity culture survey targeting healthcare critical infrastructures. Healthcare 10(2), 327 (2022)","journal-title":"Healthcare"},{"issue":"4","key":"7_CR25","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1108\/IMCS-08-2012-0043","volume":"21","author":"K Hedstr\u00f6m","year":"2013","unstructured":"Hedstr\u00f6m, K., Karlsson, F., Kolkowska, E.: Social action theory for understanding information security non-compliance in hospitals: the importance of user rationale. Inf. Manag. Comput. Secur. 21(4), 266\u2013287 (2013)","journal-title":"Inf. Manag. Comput. Secur."},{"issue":"3","key":"7_CR26","first-page":"116","volume":"47","author":"SL Hepp","year":"2018","unstructured":"Hepp, S.L., Tarraf, R.C., Birney, A., Arain, M.A.: Evaluation of the awareness and effectiveness of IT security programs in a large publicly funded health care system. Health Inf. Manag. J. 47(3), 116\u2013124 (2018)","journal-title":"Health Inf. Manag. J."},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Jaeger, L.: Information security awareness: literature review and integrative framework. In: Proceedings of the 51st Hawaii International Conference on System Sciences (HICSS), pp. 4703\u20134712 (2018)","DOI":"10.24251\/HICSS.2018.593"},{"issue":"5","key":"7_CR28","doi-asserted-by":"publisher","DOI":"10.2196\/10059","volume":"20","author":"MS Jalali","year":"2018","unstructured":"Jalali, M.S., Kaiser, J.P.: Cybersecurity in hospitals: a systematic, organizational perspective. J. Med. Internet Res. 20(5), e10059 (2018)","journal-title":"J. Med. Internet Res."},{"issue":"2","key":"7_CR29","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1002\/nop2.1353","volume":"10","author":"J Kang","year":"2023","unstructured":"Kang, J., Seomun, G.: Development and validation of the information security attitude questionnaire (ISA-Q) for nurses. Nurs. Open 10(2), 850\u2013860 (2023)","journal-title":"Nurs. Open"},{"issue":"2","key":"7_CR30","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/S1386-5056(00)00112-X","volume":"60","author":"SK Katsikas","year":"2000","unstructured":"Katsikas, S.K.: Health care management and information systems security: awareness, training or education? Int. J. Med. Inform. 60(2), 129\u2013135 (2000)","journal-title":"Int. J. Med. Inform."},{"issue":"1","key":"7_CR31","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1177\/1460458219832048","volume":"26","author":"SR Kessler","year":"2020","unstructured":"Kessler, S.R., Pindek, S., Kleinman, G., Andel, S.A., Spector, P.E.: Information security climate and the assessment of information security risk among healthcare employees. Health Inf. J. 26(1), 461\u2013473 (2020)","journal-title":"Health Inf. J."},{"key":"7_CR32","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-23141-4_1","volume-title":"Information Security and Assurance","author":"B Khan","year":"2011","unstructured":"Khan, B., Alghathbar, K.S., Khan, M.K.: Information security awareness campaign: an alternate approach. In: Kim, T., Adeli, H., Robles, R.J., Balitanas, M. (eds.) ISA 2011. CCIS, vol. 200, pp. 1\u201310. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23141-4_1"},{"issue":"1","key":"7_CR33","first-page":"1","volume":"25","author":"CS Kruse","year":"2017","unstructured":"Kruse, C.S., Frederick, B., Jacobson, T., Monticone, D.K.: Cybersecurity in healthcare: a systematic review of modern threats and trends. Technol. Healthc. 25(1), 1\u201310 (2017)","journal-title":"Technol. Healthc."},{"issue":"1","key":"7_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s12913-020-05215-4","volume":"20","author":"K Lambe","year":"2020","unstructured":"Lambe, K., et al.: Understanding hand hygiene behaviour in the intensive care unit to inform interventions: an interview study. BMC Health Serv. Res. 20(1), 1\u20139 (2020)","journal-title":"BMC Health Serv. Res."},{"issue":"2","key":"7_CR35","volume":"1","author":"S Landolt","year":"2012","unstructured":"Landolt, S., Hirschel, J., Schlienger, T., Businger, W., Zbinden, A.M.: Assessing and comparing information security in Swiss hospitals. Int. J. Med. Res. 1(2), e11 (2012)","journal-title":"Int. J. Med. Res."},{"key":"7_CR36","unstructured":"Liginlal, D., Sim, I., Khansa, L., Fearn, P.: Human error and privacy breaches in healthcare organizations: causes and management strategies. In: Proceedings of the Fifteenth Americas Conference on Information System (AMCIS) (2009)"},{"key":"7_CR37","unstructured":"Lyngaas, S.: Brooklyn hospital network reverts to paper charts for weeks after cyberattack. CNN (2022). https:\/\/edition.cnn.com\/2022\/12\/20\/tech\/hospital-ransomware\/index.html"},{"issue":"6","key":"7_CR38","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1097\/ACM.0000000000003859","volume":"96","author":"LA Maggio","year":"2021","unstructured":"Maggio, L.A., Dameff, C., Kanter, S.L., Woods, B., Tully, J.: Cybersecurity challenges and the academic health center: an interactive tabletop simulation for executives. Acad. Med. J. Assoc. Am. Med. Coll. 96(6), 850\u2013853 (2021)","journal-title":"Acad. Med. J. Assoc. Am. Med. Coll."},{"key":"7_CR39","doi-asserted-by":"crossref","unstructured":"Murphy, A.R., Reddy, M.C., Xu, H.: Privacy practices in collaborative environments: a study of emergency department staff. In: Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work and Social Computing, CSCW 2014, pp. 269\u2013282. Association for Computing Machinery, New York (2014)","DOI":"10.1145\/2531602.2531643"},{"issue":"15","key":"7_CR40","doi-asserted-by":"publisher","first-page":"5119","DOI":"10.3390\/s21155119","volume":"21","author":"S Nifakos","year":"2021","unstructured":"Nifakos, S., et al.: Influence of human factors on cyber security within healthcare organisations: a systematic review. Sensors 21(15), 5119 (2021)","journal-title":"Sensors"},{"key":"7_CR41","doi-asserted-by":"crossref","unstructured":"\u00d6zaslan, G., et al.: Evaluation of the effects of information security training on employees: a study from a private hospital. Int. J. Health Manag. Tour. 5(3), 336\u2013347 (2020)","DOI":"10.31201\/ijhmt.791913"},{"issue":"6","key":"7_CR42","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1086\/501777","volume":"21","author":"D Pittet","year":"2000","unstructured":"Pittet, D.: Improving compliance with hand hygiene in hospitals. Infect. Control Hosp. Epidemiol. 21(6), 381\u2013386 (2000)","journal-title":"Infect. Control Hosp. Epidemiol."},{"key":"7_CR43","unstructured":"Ralston, W.: The untold story of a cyberattack, a hospital and a dying woman. WIRED (2020). https:\/\/www.wired.co.uk\/article\/ransomware-hospital-death-germany"},{"issue":"4","key":"7_CR44","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1108\/09685221211267666","volume":"20","author":"K Renaud","year":"2012","unstructured":"Renaud, K., Goucher, W.: Health service employees and information security policies: an uneasy partnership? Inf. Manag. Comput. Secur. 20(4), 296\u2013311 (2012)","journal-title":"Inf. Manag. Comput. Secur."},{"key":"7_CR45","doi-asserted-by":"publisher","first-page":"205520762210817","DOI":"10.1177\/20552076221081716","volume":"8","author":"F Rizzoni","year":"2022","unstructured":"Rizzoni, F., Magalini, S., Casaroli, A., Mari, P., Dixon, M., Coventry, L.: Phishing simulation exercise in a large hospital: a case study. Digital Health 8, 20552076221081716 (2022)","journal-title":"Digital Health"},{"issue":"12","key":"7_CR46","doi-asserted-by":"publisher","first-page":"2531","DOI":"10.3390\/healthcare10122531","volume":"10","author":"PK Sari","year":"2022","unstructured":"Sari, P.K., Handayani, P.W., Hidayanto, A.N., Yazid, S., Aji, R.F.: Information security behavior in health information systems: a review of research trends and antecedent factors. Healthcare 10(12), 2531 (2022)","journal-title":"Healthcare"},{"key":"7_CR47","first-page":"635","volume":"281","author":"T Schmidt","year":"2021","unstructured":"Schmidt, T., N\u00f8hr, C., Koppel, R.: A simple assessment of information security awareness in hospital staff across five Danish regions. Stud. Health Technol. Inf. 281, 635\u2013639 (2021)","journal-title":"Stud. Health Technol. Inf."},{"issue":"2","key":"7_CR48","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/503345.503348","volume":"31","author":"MT Siponen","year":"2001","unstructured":"Siponen, M.T.: Five dimensions of information security awareness. ACM SIGCAS Comput. Soc. 31(2), 24\u201329 (2001)","journal-title":"ACM SIGCAS Comput. Soc."},{"issue":"1","key":"7_CR49","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1108\/09685221211219182","volume":"20","author":"G Stewart","year":"2012","unstructured":"Stewart, G., Lacey, D.: Death by a thousand facts: criticising the technocratic approach to information security awareness. Inf. Manag. Comput. Secur. 20(1), 29\u201338 (2012)","journal-title":"Inf. Manag. Comput. Secur."},{"key":"7_CR50","unstructured":"Taylor, R.: Management perception of unintentional information security risks. In: Proceedings of the 27th International Conference on Information Systems (ICIS) (2006)"},{"issue":"1","key":"7_CR51","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1057\/ejis.2013.27","volume":"24","author":"A Tsohou","year":"2015","unstructured":"Tsohou, A., Karyda, M., Kokolakis, S., Kiountouzis, E.: Managing the introduction of information security awareness programmes in organisations. Eur. J. Inf. Syst. 24(1), 38\u201358 (2015)","journal-title":"Eur. J. Inf. Syst."},{"key":"7_CR52","doi-asserted-by":"crossref","unstructured":"Wilson, M., Hash, J.: Building an Information Technology Security Awareness and Training Program. Technical report NIST SP 800-50. National Institute of Standards and Technology (2003)","DOI":"10.6028\/NIST.SP.800-50"},{"key":"7_CR53","first-page":"1i","volume":"19","author":"LH Yeo","year":"2022","unstructured":"Yeo, L.H., Banfield, J.: Human factors in electronic health records cybersecurity breach: an exploratory analysis. Perspect. Health Inf. Manag. 19, 1i (2022)","journal-title":"Perspect. Health Inf. Manag."}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-61382-1_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T01:53:00Z","timestamp":1717206780000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-61382-1_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031613814","9783031613821"],"references-count":53,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-61382-1_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"1 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Washington DC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2024.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}