{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T09:25:53Z","timestamp":1743067553382,"version":"3.40.3"},"publisher-location":"Cham","reference-count":48,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031744365"},{"type":"electronic","value":"9783031744372"}],"license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-74437-2_5","type":"book-chapter","created":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T11:03:23Z","timestamp":1730372603000},"page":"46-62","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["How to Strengthen Personal Cyber Security Competencies? Extending the Cyber Security Domain Model (CSDM) to Individuals: A Literature-Based Domain Analysis"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1017-6072","authenticated-orcid":false,"given":"Florian","family":"Sch\u00fctz","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Laura","family":"Scholz","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-8215-2108","authenticated-orcid":false,"given":"Simon","family":"Hugenberg","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5454-4175","authenticated-orcid":false,"given":"Julia","family":"Warwas","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4784-4038","authenticated-orcid":false,"given":"Simon","family":"Trang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,11,1]]},"reference":[{"key":"5_CR1","doi-asserted-by":"publisher","unstructured":"Eurostat: Internet use by individuals. Data set. European Commission, Eurostat (2024). https:\/\/doi.org\/10.2908\/TIN00028. Accessed 16 June 2024","DOI":"10.2908\/TIN00028"},{"key":"5_CR2","unstructured":"Deutschland sicher im Netz (DsiN): DsiN Sicherheitsindex 2022. Studie von Deutschland sicher im Netz e.V. zur digitalen Sicherheitslage von Verbraucher:innen in Deutschland. Deutschland sicher im Netz (DsiN), Berlin (2022). https:\/\/www.sicher-im-netz.de\/dsin-sicherheitsindex-2022. Accessed 7 February 2023"},{"key":"5_CR3","unstructured":"Federal Criminal Police Office of Germany (BKA): Bundeslagebild Cybercrime 2021, Wiesbaden (2022). https:\/\/www.bka.de\/SharedDocs\/Downloads\/DE\/Publikationen\/JahresberichteUndLagebilder\/Cybercrime\/cybercrimeBundeslagebild2021. Accessed 16 September 2022"},{"key":"5_CR4","unstructured":"Federal Bureau of Investigation (FBI): Internet Crime Report 2021. Internet Crime Complaint Center (IC3). Federal Bureau of Investigation (FBI) (2021). https:\/\/www.ic3.gov\/AnnualReport\/Reports\/2021_IC3Report.pdf. Accessed 24 October 2024"},{"key":"5_CR5","unstructured":"Fleck, A.: Cybercrime Expected To Skyrocket in Coming Years. Statista (2022). https:\/\/www.statista.com\/chart\/28878\/expected-cost-of-cybercrime-until-2027\/. Accessed 7 April 2023"},{"key":"5_CR6","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.cose.2017.01.004","volume":"66","author":"K Parsons","year":"2017","unstructured":"Parsons, K., Calic, D., Pattinson, M., Butavicius, M., McCormac, A., Zwaans, T.: The Human Aspects of Information Security Questionnaire (HAIS-Q): Two further validation studies. Comput. Secur. 66, 40\u201351 (2017). https:\/\/doi.org\/10.1016\/j.cose.2017.01.004","journal-title":"Comput. Secur."},{"issue":"2","key":"5_CR7","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1108\/ICS-04-2019-0041","volume":"28","author":"P Shah","year":"2020","unstructured":"Shah, P., Agarwal, A.: Cybersecurity behaviour of smartphone users in India: an empirical analysis. Info. Comp. Sec. 28(2), 293\u2013318 (2020). https:\/\/doi.org\/10.1108\/ICS-04-2019-0041","journal-title":"Info. Comp. Sec."},{"key":"5_CR8","doi-asserted-by":"publisher","unstructured":"Nurse, J.R.C.: Cybersecurity awareness. In: Adams, C., Barg, A., Boneh, D., Bauer, F.L., Benoit, O., Biham, E., Biryukov, A., Black, J., Blakley, R., Bleumer, G., Boeyen, S. (eds.) Encyclopedia of Cryptography and Security. Springer-Verlag, Berlin, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-27739-9_1596-1","DOI":"10.1007\/978-3-642-27739-9_1596-1"},{"key":"5_CR9","unstructured":"Li, Y., Siponen, M.: A Call For Research On Home Users\u2019 Information Security Behaviour. PACIS 2011 Proceedings, 112, pp. 1\u201311 (2011)"},{"key":"5_CR10","unstructured":"Lin, C., Kunnathur, A.: Toward Developing a Theory of End User Information Security Competence. AMCIS 2013 Proceedings, 1, pp. 1\u201310 (2013)"},{"key":"5_CR11","unstructured":"Rampold, F., Sch\u00fctz, F., Masuch, K., K\u00f6pfer, P., Warwas, J.: Are You Aware Of Your Competencies? \u2013 The Potentials Of Competence Research To Design Effective SETA Programs. ECIS 2022 Proceedings 134, pp. 1\u201317 (2022)"},{"key":"5_CR12","unstructured":"Whitman, M.E., Mattord, H.J.: Principles of information security, 4th edn. Course Technology Cengage Learning, Stamford, Conn. (2012)"},{"issue":"4","key":"5_CR13","doi-asserted-by":"publisher","first-page":"752","DOI":"10.1080\/08874417.2021.1913671","volume":"62","author":"S Hu","year":"2021","unstructured":"Hu, S., Hsu, C., Zhou, Z.: Security education, training, and awareness programs: literature review. J. Comp. Info. Sys. 62(4), 752\u2013764 (2021). https:\/\/doi.org\/10.1080\/08874417.2021.1913671","journal-title":"J. Comp. Info. Sys."},{"key":"5_CR14","unstructured":"Federal Office for Information Security of Germany (BSI): Bericht zum Digitalen Verbraucherschutz 2021, BSI-DVS22\/001, Bonn (2022). https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Publikationen\/DVS-Berichte\/dvs-bericht_2021.pdf?__blob=publicationFile&v=4. Accessed 25 November 2022"},{"key":"5_CR15","unstructured":"Sch\u00fctz, F., et al.: Bridging the Gap between Security Competencies and Security Threats: Toward a Cyber Security Domain Model. Proceedings of the 56th Hawaii International Conference on System Sciences 2023 (HICSS-56), pp. 6118\u20136127 (2023). https:\/\/hdl.handle.net\/10125\/103375. Accessed 24 October 2024"},{"key":"5_CR16","doi-asserted-by":"publisher","unstructured":"Winther, E.: Kompetenzmessung in der beruflichen Bildung. W. Bertelsmann Verlag, Bielefeld (2010). https:\/\/doi.org\/10.3278\/6004148w","DOI":"10.3278\/6004148w"},{"key":"5_CR17","unstructured":"Rampold, F., Heinsohn, J., Sch\u00fctz, F., Klein, J., Warwas, J.W.: Custom Solutions for Diverse Needs: Laying the Foundation for Tailored SETA Programs in the Healthcare Domain. Proceedings of the 57th Hawaii International Conference on System Sciences 2024 (HICSS-57), pp. 3719\u20133728 (2024). https:\/\/hdl.handle.net\/10125\/106832. Accessed 24 October 2024"},{"issue":"b2535","key":"5_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1136\/bmj.b2535","volume":"339","author":"D Moher","year":"2009","unstructured":"Moher, D., Liberati, A., Tetzlaff, J., Altman, D.G.: Preferred reporting items for systematic reviews and meta-analyses: the PRISMA statement. The BMJ 339(b2535), 1\u20138 (2009). https:\/\/doi.org\/10.1136\/bmj.b2535","journal-title":"The BMJ"},{"key":"5_CR19","doi-asserted-by":"publisher","unstructured":"Vom Brocke, J., et al.: Standing on the shoulders of giants. challenges and recommendations of literature search in information systems research. Comm. Asso. Info. Sys. 37(9), 205\u2013224 (2015). https:\/\/doi.org\/10.17705\/1CAIS.03709","DOI":"10.17705\/1CAIS.03709"},{"key":"5_CR20","unstructured":"Webster, J., Watson, R.T.: Analyzing the past to prepare for the future. Writ. Lit. Rev. MIS Q. 26(2), xiii\u2013xxiii (2002)"},{"key":"5_CR21","doi-asserted-by":"publisher","unstructured":"Riek, M., B\u00f6hme, R.: The costs of consumer-facing cybercrime: an empirical exploration of measurement issues and estimates\u2020. J. Cybersecurity 4(1), 1\u201316 (2018). tyy004, https:\/\/doi.org\/10.1093\/cybsec\/tyy004","DOI":"10.1093\/cybsec\/tyy004"},{"key":"5_CR22","unstructured":"Federal Criminal Police Office of Germany (BKA): Cybercrime. Was ist Cybercrime? (2022) https:\/\/www.bka.de\/DE\/UnsereAufgaben\/Deliktsbereiche\/Cybercrime\/cybercrime_neu. Accessed 11 November 2022"},{"key":"5_CR23","doi-asserted-by":"publisher","first-page":"137293","DOI":"10.1109\/ACCESS.2020.3011259","volume":"8","author":"WA Al-Khater","year":"2020","unstructured":"Al-Khater, W.A., Al-Maadeed, S., Ahmed, A.A., Sadiq, A.S., Khan, M.K.: Comprehensive review of cybercrime detection techniques. IEEE Access 8, 137293\u2013137311 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3011259","journal-title":"IEEE Access"},{"key":"5_CR24","unstructured":"Deutschland sicher im Netz (DsiN): DsiN Sicherheitsindex 2023. Studie von Deutschland sicher im Netz e. V. zur digitalen Sicherheitslage von Verbraucher:innen in Deutschland. Deutschland sicher im Netz (DsiN), Berlin (2023). https:\/\/www.sicher-im-netz.de\/dsin-sicherheitsindex-2023. Accessed 1 November 2023"},{"key":"5_CR25","unstructured":"Birkel, C., Church, D., Erdmann, A., Hager, A., Leitg\u00f6b-Guzy, N.: Sicherheit und Kriminalit\u00e4t in Deutschland - SKiD 2020. Bundesweite Kernbefunde des Viktimisierungssurvey des Bundeskriminalamts und der Polizei der L\u00e4nder. Deutschland, Wiesbaden (2023). https:\/\/www.bka.de\/DE\/UnsereAufgaben\/Forschung\/ForschungsprojekteUndErgebnisse\/Dunkelfeldforschung\/SKiD\/Ergebnisse\/Ergebnisse_node.html"},{"key":"5_CR26","unstructured":"Onemichl, A., Bolz, C.: Digitalbarometer. B\u00fcrgerbefragung zur Cyber-Sicherheit 2022. Kurzbericht zur Studie der Polizeilichen Kriminalpr\u00e4vention der L\u00e4nder und des Bundes (ProPK) und des Bundesamtes f\u00fcr Sicherheit in der Informationstechnik (BSI), Bonn (2022). https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Digitalbarometer\/Digitalbarometer-ProPK-BSI_2022.pdf. Accessed 31 October 2023"},{"key":"5_CR27","unstructured":"Federal Office for Information Security of Germany (BSI): Die Lage der IT-Sicherheit in Deutschland 2021, Bonn (2021). https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Publikationen\/Lageberichte\/Lagebericht2021. Accessed 24 October 2024"},{"key":"5_CR28","unstructured":"National Cyber Security Centre (NCSC): NCSC Annual Review 2022. Making the UK the safest place to live and work online (2022). https:\/\/www.ncsc.gov.uk\/collection\/annual-review-2022. Accessed 19 November 2023"},{"key":"5_CR29","unstructured":"van Nek, L., Bolz, C.: Digitalbarometer 2021. B\u00fcrgerbefragung zur Cyber-Sicherheit. Kurzbericht zur Studie der Polizeilichen Kriminalpr\u00e4vention der L\u00e4nder und des Bundes (ProPK) und des Bundesamtes f\u00fcr Sicherheit in der Informationstechnik (BSI), Bonn (2021). https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Digitalbarometer\/Digitalbarometer-ProPK-BSI_2021.pdf?__blob=publicationFile&v=2. Accessed 9 March 2023"},{"key":"5_CR30","unstructured":"Rampold, F., Masuch, K., Warwas, J., Trang, S.: Triad or error? introducing three basic dimensions of competence as a driving force for information security performance. ICIS 2023 Proceedings, 11, pp. 1\u201317 (2023)"},{"key":"5_CR31","doi-asserted-by":"publisher","unstructured":"Asfoor, A., Rahim, F.A., Yussof, S.: Factors influencing information security awareness of phishing attacks from bank customers\u2019 perspective: a preliminary investigation. In: Saeed, F. (ed.) Recent Trends in Data Science and Soft Computing. Proceedings of the 3rd International Conference of Reliable Information and Communication Technology (IRICT 2018), pp. 641\u2013654 (2019). https:\/\/doi.org\/10.1007\/978-3-319-99007-1_60","DOI":"10.1007\/978-3-319-99007-1_60"},{"key":"5_CR32","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.cose.2013.12.003","volume":"42","author":"K Parsons","year":"2014","unstructured":"Parsons, K., McCormac, A., Butavicius, M., Pattinson, M., Jerram, C.: Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q). Comput. Secur. 42, 165\u2013176 (2014). https:\/\/doi.org\/10.1016\/j.cose.2013.12.003","journal-title":"Comput. Secur."},{"issue":"5","key":"5_CR33","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1002\/job.4030150503","volume":"15","author":"PE Spector","year":"1994","unstructured":"Spector, P.E.: Using self-report questionnaires in OB research: a comment on the use of a controversial method. J. Organ. Behav. 15(5), 385\u2013392 (1994). https:\/\/doi.org\/10.1002\/job.4030150503","journal-title":"J. Organ. Behav."},{"key":"5_CR34","first-page":"4","volume":"2","author":"FE Weinert","year":"2000","unstructured":"Weinert, F.E.: Lehren und Lernen f\u00fcr die Zukunft - Anspr\u00fcche an das Lernen in der Schule. Nachrichten der Gesellschaft zur F\u00f6rderung P\u00e4dagogischer Forschung 2, 4\u201323 (2000)","journal-title":"Nachrichten der Gesellschaft zur F\u00f6rderung P\u00e4dagogischer Forschung"},{"key":"5_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5281\/zenodo.8300825","volume":"2023","author":"P K\u00f6pfer","year":"2023","unstructured":"K\u00f6pfer, P., Warwas, J., Sch\u00fctz, F., Rampold, F., Masuch, K., Trang, S.: A competence-based screening of instructional designs in trainings for IT-security at the workplace. AERA 2023, 1\u201311 (2023). https:\/\/doi.org\/10.5281\/zenodo.8300825","journal-title":"AERA"},{"issue":"1","key":"5_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40461-023-00145-x","volume":"15","author":"J Warwas","year":"2023","unstructured":"Warwas, J., et al.: Developing and validating an online situational judgment test on the stress coping competence of nursing apprentices. Empirical Res. Vocat. Edu. Train. 15(5), 1\u201324 (2023). https:\/\/doi.org\/10.1186\/s40461-023-00145-x","journal-title":"Empirical Res. Vocat. Edu. Train."},{"key":"5_CR37","doi-asserted-by":"publisher","unstructured":"Mislevy, R.J., Almond, R.G., Lukas, J.F.: A brief introduction to evidence-centered design. ETS Research Report Series 2003(1), 1\u201329 (2003). RR-03-16, https:\/\/doi.org\/10.1002\/j.2333-8504.2003.tb01908.x","DOI":"10.1002\/j.2333-8504.2003.tb01908.x"},{"issue":"10","key":"5_CR38","doi-asserted-by":"publisher","first-page":"107","DOI":"10.7205\/MILMED-D-13-00213","volume":"178","author":"RJ Mislevy","year":"2013","unstructured":"Mislevy, R.J.: Evidence-centered design for simulation-based assessment. Mil. Med. 178(10), 107\u2013114 (2013). https:\/\/doi.org\/10.7205\/MILMED-D-13-00213","journal-title":"Mil. Med."},{"key":"5_CR39","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.cose.2015.04.006","volume":"52","author":"A Tsohou","year":"2015","unstructured":"Tsohou, A., Karyda, M., Kokolakis, S.: Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs. Comput. Secur. 52, 128\u2013141 (2015). https:\/\/doi.org\/10.1016\/j.cose.2015.04.006","journal-title":"Comput. Secur."},{"key":"5_CR40","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.cose.2013.04.004","volume":"38","author":"R von Solms","year":"2013","unstructured":"von Solms, R., van Niekerk, J.: From information security to cyber security. Comput. Secur. 38, 97\u2013102 (2013). https:\/\/doi.org\/10.1016\/j.cose.2013.04.004","journal-title":"Comput. Secur."},{"key":"5_CR41","doi-asserted-by":"publisher","unstructured":"Blank, R.M., Gallagher, P.D.: NIST Special Publication 800-30. Revision 1. Guide for Conducting Risk Assessments. National Institute of Standards and Technology (NIST), Gaithersburg (2012). https:\/\/doi.org\/10.6028\/NIST.SP.800-30r1","DOI":"10.6028\/NIST.SP.800-30r1"},{"key":"5_CR42","unstructured":"Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d'information (ANSSI): Ransomware attacks, all concerned. How to prevent them and respond to an incident, ANSSI-GP-077-EN (2021). https:\/\/cyber.gouv.fr\/sites\/default\/files\/2021\/08\/anssi-guide-ransomware_attacks_all_concerned-v1.0.pdf. Accessed 21 October 2024"},{"key":"5_CR43","unstructured":"Federal Office for Information Security of Germany (BSI): Bericht zum Digitalen Verbraucherschutz 2022, BSI-DVS23\/001, Bonn (2023). https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Publikationen\/DVS-Berichte\/dvs-bericht_2022.pdf. Accessed 31 October 2023"},{"key":"5_CR44","unstructured":"Deutschland sicher im Netz (DsiN): Basisschutz digital. https:\/\/www.sicher-im-netz.de\/basisschutz-digital (2023). Accessed 1 November 2023"},{"key":"5_CR45","unstructured":"Federal Office for Information Security of Germany (BSI): Die Lage der IT-Sicherheit in Deutschland 2022, Bonn (2022). https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Publikationen\/Lageberichte\/Lagebericht2022. Accessed 16 February 2023"},{"key":"5_CR46","unstructured":"Federal Bureau of Investigation (FBI): Internet Crime Report 2022. Internet Crime Complaint Center (IC3) (2022). https:\/\/www.ic3.gov\/AnnualReport\/Reports\/2022_IC3Report.pdf. Accessed 21 October 2024"},{"key":"5_CR47","doi-asserted-by":"publisher","unstructured":"Cormack, G.V.: Email Spam Filtering: A Systematic Review. Foundations and Trends\u00ae in Information Retrieval 1(4), 335\u2013455 (2006). https:\/\/doi.org\/10.1561\/1500000006","DOI":"10.1561\/1500000006"},{"issue":"4","key":"5_CR48","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1111\/j.1745-3992.2006.00075.x","volume":"25","author":"RJ Mislevy","year":"2006","unstructured":"Mislevy, R.J., Haertel, G.D.: Implications of evidence-centered design for educational testing. Educ. Meas. Issues Pract. 25(4), 6\u201320 (2006). https:\/\/doi.org\/10.1111\/j.1745-3992.2006.00075.x","journal-title":"Educ. Meas. Issues Pract."}],"container-title":["Lecture Notes in Business Information Processing","Generative AI in e-Business"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-74437-2_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T11:06:54Z","timestamp":1730372814000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-74437-2_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,1]]},"ISBN":["9783031744365","9783031744372"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-74437-2_5","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2024,11,1]]},"assertion":[{"value":"1 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WeB","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Workshop on e-Business","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hyderabad","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"web2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2023.ebizworkshop.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}