{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:40:42Z","timestamp":1776102042333,"version":"3.50.1"},"publisher-location":"Cham","reference-count":52,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031725586","type":"print"},{"value":"9783031725593","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T00:00:00Z","timestamp":1732752000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T00:00:00Z","timestamp":1732752000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Phishing is a danger to both private users and businesses. Industry and academia have proposed several approaches to deal with this threat, many of which developed with a supposedly human-centric design. Yet, to our knowledge, there is no research focused on the misconceptions that users might have on phishing. This glaring gap is a problem, as previous research has shown that not engaging with the mental model of users can lead to lack of effectiveness of an approach in the real world. To address this gap, we conducted a systematic literature review starting from papers published at CHI in the last ten years, and expanding to other venues through a backward and a forward search based on the initial relevant CHI papers. We identified 15 misconceptions about phishing in 21 papers that researchers should address in their solutions to enhance the effectiveness of their approaches.<\/jats:p>","DOI":"10.1007\/978-3-031-72559-3_15","type":"book-chapter","created":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T04:25:27Z","timestamp":1732681527000},"page":"215-228","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Literature Review: Misconceptions About Phishing"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9997-3432","authenticated-orcid":false,"given":"Mattia","family":"Mossano","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2674-4043","authenticated-orcid":false,"given":"Melanie","family":"Volkamer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,28]]},"reference":[{"issue":"12","key":"15_CR1","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/322796.322806","volume":"42","author":"A Adams","year":"1999","unstructured":"Adams, A., Sasse, M.A.: Users are not the enemy. Commun. ACM 42(12), 40\u201346 (1999). https:\/\/doi.org\/10.1145\/322796.322806","journal-title":"Commun. ACM"},{"key":"15_CR2","doi-asserted-by":"publisher","unstructured":"Ahmad, R., Terzis, S.: Understanding phishing in mobile instant messaging: a study into user behaviour toward shared links. In: Human Aspects of Information Security and Assurance, HAISA 2022, pp. 197\u2013206. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-12172-2_15","DOI":"10.1007\/978-3-031-12172-2_15"},{"key":"15_CR3","doi-asserted-by":"publisher","unstructured":"Albakry, S., Vaniea, K., Wolters, M.K.: What is this URL\u2019s destination? empirical evaluation of users\u2019 url reading. In: Conference on Human Factors in Computing Systems, CHI 2020, pp. 1\u201312. ACM, New York (2020). https:\/\/doi.org\/10.1145\/3313831.3376168","DOI":"10.1145\/3313831.3376168"},{"key":"15_CR4","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.ijhcs.2015.05.005","volume":"82","author":"M Alsharnouby","year":"2015","unstructured":"Alsharnouby, M., Alaca, F., Chiasson, S.: Why phishing still works: user strategies for combating phishing attacks. Int. J. Hum Comput Stud. 82, 69\u201382 (2015). https:\/\/doi.org\/10.1016\/j.ijhcs.2015.05.005","journal-title":"Int. J. Hum Comput Stud."},{"key":"15_CR5","unstructured":"Althobaiti, K., Vaniea, K., Zheng, S.: Faheem: explaining urls to people using a slack bot. In: Symposium on Digital Behaviour Intervention for Cyber Security, AISB 2018 pp.\u00a01\u20138. Edinburgh Research Explorer, Liverpool, GB (2018)"},{"key":"15_CR6","unstructured":"Anti-Phishing Working Group: Phishing Activity Trends Report. Tech. Rep. 4th Quarter 2023, APWG (2024). https:\/\/docs.apwg.org\/reports\/apwg_trends_report_q4_2023.pdf"},{"key":"15_CR7","doi-asserted-by":"publisher","unstructured":"Bada, M., Sasse, A.M., Nurse, J.R.C.: Cyber Security Awareness Campaigns: Why do they fail to change behaviour? arXiv (2019). https:\/\/doi.org\/10.48550\/arxiv.1901.02672","DOI":"10.48550\/arxiv.1901.02672"},{"key":"15_CR8","unstructured":"Beyer, M., Ahmed, S., Doerlemann, K., Arnell, S., Parkin, S., Sasse, A., Passingham, N.: Awareness is Only the First Step. White paper (2015)"},{"key":"15_CR9","doi-asserted-by":"publisher","unstructured":"Bilge, L., Strufe, T., Balzarotti, D., Kirda, E.: All your contacts are belong to us: automated identity theft attacks on social networks. In: Conference on World Wide Web, WWW 2009, pp. 551\u2013560. ACM, New York (2009). https:\/\/doi.org\/10.1145\/1526709.1526784","DOI":"10.1145\/1526709.1526784"},{"key":"15_CR10","unstructured":"CORE: Icore conference portal (2024). url=https:\/\/portal.core.edu.au\/conf-ranks\/11\/"},{"key":"15_CR11","doi-asserted-by":"publisher","unstructured":"Das, A., Baki, S., Aassal, A.E., Verma, R., Dunbar, A.: SOK: A Comprehensive Reexamination of Phishing Research from the Security Perspective. arXiv (2019). https:\/\/doi.org\/10.48550\/arxiv.1911.00953","DOI":"10.48550\/arxiv.1911.00953"},{"key":"15_CR12","doi-asserted-by":"publisher","unstructured":"Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: Conference on Human Factors in Computing Systems, CHI 2006, pp. 581\u2013590. ACM, New York (2006) https:\/\/doi.org\/10.1145\/1124772.1124861","DOI":"10.1145\/1124772.1124861"},{"key":"15_CR13","doi-asserted-by":"publisher","unstructured":"Distler, V.: The influence of context on response to spear-phishing attacks: an in-situ deception study. In: Conference on Human Factors in Computing Systems, CHI 2023, pp. 1\u201318. ACM, New York(2023). https:\/\/doi.org\/10.1145\/3544548.3581170","DOI":"10.1145\/3544548.3581170"},{"key":"15_CR14","doi-asserted-by":"publisher","unstructured":"Edwards, G.W., Gonzales, M.J., Sullivan, M.A.: Robocalling: stirred and shaken! - an investigation of calling displays on trust and answer rates. In: Conference on Human Factors in Computing Systems, CHI 2020, pp. 1\u201312. ACM, New York (2020). https:\/\/doi.org\/10.1145\/3313831.3376679","DOI":"10.1145\/3313831.3376679"},{"key":"15_CR15","unstructured":"Federal Bureau of Investigation: 2023 Internet Crime Report. Tech. rep., FBI (2024). https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2023_IC3Report.pdf"},{"key":"15_CR16","unstructured":"Federal Communication Commission: TRACED Act Implementation (2024). https:\/\/www.fcc.gov\/TRACEDAct"},{"key":"15_CR17","doi-asserted-by":"publisher","unstructured":"Frik, A., Kim, J., Sanchez, J.R., Ma, J.: Users\u2019 expectations about and use of smartphone privacy and security settings. In: Conference on Human Factors in Computing Systems, CHI 2022, pp. 1\u201324. ACM, New York (2022). https:\/\/doi.org\/10.1145\/3491102.3517504","DOI":"10.1145\/3491102.3517504"},{"key":"15_CR18","doi-asserted-by":"publisher","unstructured":"Hadan, H., Serrano, N., Camp, L.J.: A holistic analysis of web-based public key infrastructure failures: comparing experts\u2019 perceptions and real-world incidents. J. Cybersec. 7(1), tyab025 (2021). https:\/\/doi.org\/10.1093\/cybsec\/tyab025","DOI":"10.1093\/cybsec\/tyab025"},{"key":"15_CR19","doi-asserted-by":"publisher","unstructured":"Herbert, F., et al.: A world full of privacy and security (mis)conceptions? findings of a representative survey in 12 countries. In: Conference on Human Factors in Computing Systems, CHI 2023, pp. 1\u201323. ACM, New York (2023). https:\/\/doi.org\/10.1145\/3544548.3581410","DOI":"10.1145\/3544548.3581410"},{"key":"15_CR20","doi-asserted-by":"publisher","unstructured":"Jeong, R., Chiasson, S.: \u2019Lime\u2019, \u2019open lock\u2019, and \u2019blocked\u2019: children\u2019s perception of colors, symbols, and words in cybersecurity warnings. In: Conference on Human Factors in Computing Systems, CHI 2020, pp. 1\u201313. , ACM, New York (2020). https:\/\/doi.org\/10.1145\/3313831.3376611","DOI":"10.1145\/3313831.3376611"},{"key":"15_CR21","unstructured":"Kitchenham, B.: Procedures for Performing Systematic Reviews. Keele University, Keele, GB, Tech. rep. (2004)"},{"key":"15_CR22","doi-asserted-by":"publisher","unstructured":"Krombholz, K., Busse, K., Smith, M., von Zezschwitz, E.: If HTTPS were secure, i wouldn\u2019t need 2fa-end user and administrator mental models of HTTPS. In: IEEE Symposium on Security and Privacy, IEEE S &P 2019, pp. 246\u2013263. IEEE, New York (2019). https:\/\/doi.org\/10.1109\/sp.2019.00060","DOI":"10.1109\/sp.2019.00060"},{"key":"15_CR23","doi-asserted-by":"publisher","unstructured":"Marin, I.A., Burda, P., Zannone, N., Allodi, L.: The influence of human factors on the intention to report phishing emails. In: Conference on Human Factors in Computing System, CHI 2023, pp. 1\u201318. ACM, New York (2023). https:\/\/doi.org\/10.1145\/3544548.3580985","DOI":"10.1145\/3544548.3580985"},{"key":"15_CR24","doi-asserted-by":"publisher","unstructured":"Mayer, P., Volkamer, M.: Addressing misconceptions about password security effectively. In: Workshop on Socio-Technical Aspects in Security and Trust, STAST 2017, pp. 16\u201327. ACM, New York (2018).https:\/\/doi.org\/10.1145\/3167996.3167998","DOI":"10.1145\/3167996.3167998"},{"key":"15_CR25","unstructured":"Misra, G., Arachchilage, N.A.G., Berkovsky, S.: Phish Phinder: a game design approach to enhance user confidence in mitigating phishing attacks. In: Symposium on Human Aspects of Information Security & Assurance, HAISA 2017, pp. 41\u201351, Adelaide, AU (2017)"},{"key":"15_CR26","unstructured":"MITRE ATCK &CK: Internal Spearphishing (2024). https:\/\/attack.mitre.org\/techniques\/T1534\/"},{"key":"15_CR27","doi-asserted-by":"publisher","unstructured":"Mossano, M., et al.: SMILE - Smart eMaIl link domain extractor. In: Computer Security. ESORICS 2021 International Workshops, SPOSE 2021, pp. 403\u2013412. Springer, Online (2022). https:\/\/doi.org\/10.1007\/978-3-030-95484-0_23","DOI":"10.1007\/978-3-030-95484-0_23"},{"key":"15_CR28","doi-asserted-by":"publisher","unstructured":"Mossano, M., Kulyk, O., Berens, B.M., H\u00e4u\u00dfler, E.M., Volkamer, M.: Influence of URL formatting on users\u2019 phishing URL detection. In: European Symposium on Usable Security, EuroUSEC 2023 pp. 318\u2013333. ACM, New York (2023). https:\/\/doi.org\/10.1145\/3617072.3617111","DOI":"10.1145\/3617072.3617111"},{"key":"15_CR29","doi-asserted-by":"publisher","unstructured":"Mossano, M., Vaniea, K., Aldag, L., D\u00fczg\u00fcn, R., Mayer, P., Volkamer, M.: Analysis of publicly available anti-phishing webpages: contradicting information, lack of concrete advice and very narrow attack vector. In: European Symposium on Security and Privacy Workshops, EuroUSEC 2020, pp. 130\u2013139. IEEE, New York (2020). https:\/\/doi.org\/10.1109\/EuroSPW51379.2020.00026","DOI":"10.1109\/EuroSPW51379.2020.00026"},{"key":"15_CR30","doi-asserted-by":"publisher","unstructured":"Mustafa, H., Xu, W., Sadeghi, A.R., Schulz, S.: You can call but you can\u2019t hide: detecting caller ID spoofing attacks. In: Conference on Dependable Systems and Networks, IEEE DNS 2014, pp. 168\u2013179. (2014). https:\/\/doi.org\/10.1109\/DSN.2014.102","DOI":"10.1109\/DSN.2014.102"},{"key":"15_CR31","unstructured":"National Fraud & Cyber Crime Reporting Center: Report a phishing attempt (2024). https:\/\/www.actionfraud.police.uk\/report-phishing"},{"key":"15_CR32","unstructured":"National Institute of Standards and Technology: spam | Glossary (2024). https:\/\/csrc.nist.gov\/glossary\/term\/spam"},{"key":"15_CR33","unstructured":"Norton: What is Pegasus spyware + how to remove it from your mobile device? (2023). https:\/\/us.norton.com\/blog\/emerging-threats\/pegasus-spyware"},{"key":"15_CR34","doi-asserted-by":"publisher","unstructured":"Okuda, T., Chiba, N., Akiyama, M., Fukunaga, T., Suzuki, R., Kanda, M.: Brand validation: security indicator to better indicate website identity. In: HCI for Cybersecurity, Privacy and Trust, HCI- CPT 2021, pp. 432\u2013447 (2021). https:\/\/doi.org\/10.1007\/978-3-030-77392-2_28","DOI":"10.1007\/978-3-030-77392-2_28"},{"key":"15_CR35","doi-asserted-by":"publisher","unstructured":"Opazo, B., Whitteker, D., Shing, C.C.: Email trouble: secrets of spoofing, the dangers of social engineering, and how we can help. In: Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, ICNC-FSKD 2017, pp. 2812\u20132817 (2017). https:\/\/doi.org\/10.1109\/FSKD.2017.8393226","DOI":"10.1109\/FSKD.2017.8393226"},{"key":"15_CR36","doi-asserted-by":"publisher","unstructured":"Petelka, J., Zou, Y., Schaub, F.: Put Your Warning Where Your Link Is: improving and evaluating email phishing warnings. In: Conference on Human Factors in Computing Systems, CHI 2019, pp. 1\u201315. ACM, Glasgow, GB (2019). https:\/\/doi.org\/10.1145\/3290605.3300748","DOI":"10.1145\/3290605.3300748"},{"key":"15_CR37","doi-asserted-by":"publisher","unstructured":"Rader, E., Munasinghe, A.: \"Wait, do i know this person?\": understanding misdirected email. In: Conference on Human Factors in Computing Systems, CHI 2019, pp. 1\u201313. ACM, New York (2019). https:\/\/doi.org\/10.1145\/3290605.3300520","DOI":"10.1145\/3290605.3300520"},{"key":"15_CR38","doi-asserted-by":"publisher","unstructured":"Reeder, R.W., Felt, A.P., Consolvo, S., Malkin, N., Thompson, C., Egelman, S.: An Experience sampling study of user reactions to browser warnings in the field. In: Conference on Human Factors in Computing Systems, CHI 2018, pp. 1\u201313. ACM, New York (2018). https:\/\/doi.org\/10.1145\/3173574.3174086","DOI":"10.1145\/3173574.3174086"},{"key":"15_CR39","doi-asserted-by":"publisher","unstructured":"Reynolds, J., et al.: Measuring identity confusion with uniform resource locators. In: Conference on Human Factors in Computing Systems, CHI 2020, pp. 1\u201312. ACM, New York (2020). https:\/\/doi.org\/10.1145\/3313831.3376298","DOI":"10.1145\/3313831.3376298"},{"key":"15_CR40","doi-asserted-by":"publisher","unstructured":"Ruoti, S., Monson, T., Wu, J., Zappala, D., Seamons, K.: Weighing context and trade-offs: how suburban adults selected their online security posture. In: Symposium on Usable Privacy and Security, SOUPS 2017. USENIX, Berkeley, CA, US (2017). https:\/\/doi.org\/10.5555\/3235924.3235942, https:\/\/www.usenix.org\/system\/files\/conference\/soups2017\/soups2017-ruoti.pdf","DOI":"10.5555\/3235924.3235942"},{"key":"15_CR41","doi-asserted-by":"publisher","unstructured":"Sarker, O., Jayatilaka, A., Haggag, S., Liu, C., babar, M.A.: A multi-vocal literature review on challenges and critical success factors of phishing education, training and awareness. J. Syst. Softw. 208(111899), 1\u201325 (2024). https:\/\/doi.org\/10.1016\/j.jss.2023.111899","DOI":"10.1016\/j.jss.2023.111899"},{"key":"15_CR42","doi-asserted-by":"publisher","unstructured":"Seamons, K.: Privacy-Enhancing Technologies, pp. 149\u2013170. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-82786-1_8","DOI":"10.1007\/978-3-030-82786-1_8"},{"key":"15_CR43","doi-asserted-by":"publisher","unstructured":"Sharif, M., et al.: A field study of computer-security perceptions using anti-virus customer-support chats. In: Conference on Human Factors in Computing Systems, CHI 2019, pp. 1\u201312. ACM, New York (2019). https:\/\/doi.org\/10.1145\/3290605.3300308","DOI":"10.1145\/3290605.3300308"},{"key":"15_CR44","doi-asserted-by":"publisher","unstructured":"Shay, R., Ion, I., Reeder, R.W., Consolvo, S.: My religious aunt asked why i was trying to sell her viagra: experiences with account hijacking. In: Conference on Human Factors in Computing Systems, CHI 2014, pp. 2657\u20132666. ACM, New York (2014). https:\/\/doi.org\/10.1145\/2556288.2557330","DOI":"10.1145\/2556288.2557330"},{"issue":"5","key":"15_CR45","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/mitp.2016.84","volume":"18","author":"B Stanton","year":"2016","unstructured":"Stanton, B., Theofanos, M.F., Prettyman, S.S., Furman, S.: Security Fatigue. IT Professional 18(5), 26\u201332 (2016). https:\/\/doi.org\/10.1109\/mitp.2016.84","journal-title":"IT Professional"},{"key":"15_CR46","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-319-33630-5_12","volume-title":"ICT Systems Security and Privacy Protection","author":"M Volkamer","year":"2016","unstructured":"Volkamer, M., Renaud, K., Reinheimer, B.: TORPEDO: tooltip-powered phishing email detection. In: Hoepman, J.-H., Katzenbeisser, S. (eds.) SEC 2016. IAICT, vol. 471, pp. 161\u2013175. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-33630-5_12"},{"key":"15_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-319-98385-1_9","volume-title":"Trust, Privacy and Security in Digital Business","author":"M Volkamer","year":"2018","unstructured":"Volkamer, M., et al.: Developing and evaluating a five minute phishing awareness video. In: Furnell, S., Mouratidis, H., Pernul, G. (eds.) TrustBus 2018. LNCS, vol. 11033, pp. 119\u2013134. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-98385-1_9"},{"key":"15_CR48","doi-asserted-by":"publisher","unstructured":"Wash, R., Cooper, M.M.: Who provides phishing training? facts, stories, and people like me. In: Conference on Human Factors in Computing Systems, CHI 2018, pp. 1\u201312. ACM, Montr\u00e9al, CA (2018). https:\/\/doi.org\/10.1145\/3173574.3174066","DOI":"10.1145\/3173574.3174066"},{"key":"15_CR49","doi-asserted-by":"publisher","unstructured":"Wen, Z.A., Lin, Z., Chen, R., Andersen, E.: What.Hack: engaging anti-phishing training through a role-playing phishing simulation game. In: Conference on Human Factors in Computing Systems, CHI 2019, pp. 1\u201312. ACM, Glasgow, GB (2019). https:\/\/doi.org\/10.1145\/3290605.3300338","DOI":"10.1145\/3290605.3300338"},{"key":"15_CR50","unstructured":"Zhang, T.: Knowledge expiration in security awareness training. In: Conference on Digital Forensics, Security and Law, ADFSL 2018, pp. 197\u2013212. Embry-Riddle Aeronautical University, San Antonio, US (2018)"},{"key":"15_CR51","unstructured":"Zheng, S., Becker, I.: Presenting suspicious details in user-facing e-mail headers does not improve phishing detection. In: 18th Symposium on Usable Privacy and Security, SOUPS 2022, USENIX, Berkeley, CA, US (2022). https:\/\/www.usenix.org\/conference\/soups2022\/presentation\/zheng"},{"key":"15_CR52","doi-asserted-by":"publisher","unstructured":"Zou, Y., Roundy, K., Tamersoy, A., Shintre, S., Roturier, J., Schaub, F.: examining the adoption and abandonment of security, privacy, and identity theft protection practices. In: Conference on Human Factors in Computing Systems, CHI 2020, pp. 1\u201315. ACM, New York (2020). https:\/\/doi.org\/10.1145\/3313831.3376570","DOI":"10.1145\/3313831.3376570"}],"container-title":["IFIP Advances in Information and Communication Technology","Human Aspects of Information Security and Assurance"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-72559-3_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T05:08:00Z","timestamp":1732684080000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-72559-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,28]]},"ISBN":["9783031725586","9783031725593"],"references-count":52,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-72559-3_15","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,28]]},"assertion":[{"value":"28 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Human Aspects of Information Security and Assurance","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sk\u00f6vde","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"haisa2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.haisa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}