{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T20:45:21Z","timestamp":1742935521489,"version":"3.40.3"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031757631"},{"type":"electronic","value":"9783031757648"}],"license":[{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-75764-8_13","type":"book-chapter","created":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T11:03:12Z","timestamp":1729594992000},"page":"246-265","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["We have Phishing at Home: Quantitative Study on Email Phishing Susceptibility in Private Contexts"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3121-3888","authenticated-orcid":false,"given":"Daniel","family":"K\u00f6hler","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8218-0732","authenticated-orcid":false,"given":"Wenzel","family":"P\u00fcnter","sequence":"additional","affiliation":[]},{"given":"Christoph","family":"Meinel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,17]]},"reference":[{"unstructured":"Al-Daeef, M.M., Basir, N., Saudi, M.M.: Security awareness training: a review. In: Lecture Notes in Engineering and Computer Science (2017). iSBN: 2078-0958","key":"13_CR1"},{"issue":"26","key":"13_CR2","doi-asserted-by":"publisher","first-page":"10862","DOI":"10.5897\/AJBM11.067","volume":"5","author":"B Khan","year":"2011","unstructured":"Khan, B.: Effectiveness of information security awareness methods based on psychological theories. Afr. J. Bus. Manag. 5(26), 10862 (2011). https:\/\/doi.org\/10.5897\/AJBM11.067","journal-title":"Afr. J. Bus. Manag."},{"unstructured":"Canham, M., Constantino, M., Hudson, I., Fiore, S.M., Caulkins, B., Reinerman-Jones, L.: The enduring mystery of the repeat clickers. In: Fifteenth SOUPS (2019). USENIX Advanced Computing Systems Association (2019)","key":"13_CR3"},{"doi-asserted-by":"publisher","unstructured":"Canham, M., Posey, C., Strickland, D., Constantino, M.: Phishing for long tails: examining organizational repeat clickers and protective stewards. SAGE Open 11(1) (2021). https:\/\/doi.org\/10.1177\/2158244021990656","key":"13_CR4","DOI":"10.1177\/2158244021990656"},{"doi-asserted-by":"publisher","unstructured":"Carella, A., Kotsoev, M., Truta, T.M.: Impact of security awareness training on phishing click-through rates. In: 2017 IEEE International Conference on Big Data (Big Data) (2017). https:\/\/doi.org\/10.1109\/BigData.2017.8258485","key":"13_CR5","DOI":"10.1109\/BigData.2017.8258485"},{"unstructured":"Cisco: Cybersecurity threat trends: phishing, crypto top the list","key":"13_CR6"},{"doi-asserted-by":"publisher","unstructured":"Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 581\u2013590. ACM, Montr\u00e9al (2006). https:\/\/doi.org\/10.1145\/1124772.1124861","key":"13_CR7","DOI":"10.1145\/1124772.1124861"},{"doi-asserted-by":"publisher","unstructured":"Egelman, S., Cranor, L.F., Hong, J.: You\u2019ve been warned: an empirical study of the effectiveness of web browser phishing warnings. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2008. ACM, New York (2008). https:\/\/doi.org\/10.1145\/1357054.1357219","key":"13_CR8","DOI":"10.1145\/1357054.1357219"},{"issue":"1","key":"13_CR9","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MTAS.2007.335565","volume":"26","author":"P Finn","year":"2007","unstructured":"Finn, P., Jakobsson, M.: Designing ethical phishing experiments. IEEE Technol. Soc. Maga. 26(1), 46\u201358 (2007). https:\/\/doi.org\/10.1109\/MTAS.2007.335565","journal-title":"IEEE Technol. Soc. Maga."},{"issue":"3","key":"13_CR10","doi-asserted-by":"publisher","DOI":"10.1001\/jamanetworkopen.2019.0393","volume":"2","author":"WJ Gordon","year":"2019","unstructured":"Gordon, W.J., et al.: Assessment of employee susceptibility to phishing attacks at US health care institutions. JAMA Netw. Open 2(3), e190393 (2019). https:\/\/doi.org\/10.1001\/jamanetworkopen.2019.0393","journal-title":"JAMA Netw. Open"},{"issue":"2","key":"13_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3461672","volume":"4","author":"FL Greitzer","year":"2021","unstructured":"Greitzer, F.L., Li, W., Laskey, K.B., Lee, J., Purl, J.: Experimental investigation of technical and human factors related to phishing susceptibility. ACM Trans. Social Comput. 4(2), 1\u201348 (2021). https:\/\/doi.org\/10.1145\/3461672","journal-title":"ACM Trans. Social Comput."},{"doi-asserted-by":"publisher","unstructured":"Halevi, T., Memon, N., Nov, O.: Spear-phishing in the wild: a real-world study of personality, phishing self-efficacy and vulnerability to spear-phishing attacks. SSRN Electron. J. (2015). https:\/\/doi.org\/10.2139\/ssrn.2544742","key":"13_CR12","DOI":"10.2139\/ssrn.2544742"},{"issue":"1","key":"13_CR13","doi-asserted-by":"publisher","first-page":"1012","DOI":"10.1177\/1541931213571226","volume":"57","author":"KW Hong","year":"2013","unstructured":"Hong, K.W., Kelley, C.M., Tembe, R., Murphy-Hill, E., Mayhorn, C.B.: Keeping Up with the joneses: assessing phishing susceptibility in an email task. Proc. Human Fact. Ergon. Soc. Ann. Meet. 57(1), 1012\u20131016 (2013). https:\/\/doi.org\/10.1177\/1541931213571226","journal-title":"Proc. Human Fact. Ergon. Soc. Ann. Meet."},{"issue":"1","key":"13_CR14","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1186\/s13673-016-0065-2","volume":"6","author":"C Iuga","year":"2016","unstructured":"Iuga, C., Nurse, J.R.C., Erola, A.: Baiting the hook: factors impacting susceptibility to phishing attacks. HCIS 6(1), 8 (2016). https:\/\/doi.org\/10.1186\/s13673-016-0065-2","journal-title":"HCIS"},{"key":"13_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-3-540-77366-5_27","volume-title":"Financial Cryptography and Data Security","author":"C Jackson","year":"2007","unstructured":"Jackson, C., Simon, D.R., Tan, D.S., Barth, A.: An evaluation of extended validation and picture-in-picture phishing attacks. In: Dietrich, S., Dhamija, R. (eds.) FC 2007. LNCS, vol. 4886, pp. 281\u2013293. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-77366-5_27"},{"doi-asserted-by":"publisher","unstructured":"Jaeger, L., Eckhardt, A.: Eyes wide open: the role of situational information security awareness for security-related behaviour. Inf. Syst. J. 31(3), 429\u2013472 (2021) https:\/\/doi.org\/10.1111\/isj.12317. https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1111\/isj.12317","key":"13_CR16","DOI":"10.1111\/isj.12317"},{"doi-asserted-by":"crossref","unstructured":"Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.: Social phishing. Commun. ACM 50(10), 94\u2013100 (2007). iSBN: 0001-0782","key":"13_CR17","DOI":"10.1145\/1290958.1290968"},{"doi-asserted-by":"publisher","unstructured":"Jampen, D., G\u00fcr, G., Sutter, T., Tellenbach, B.: Don\u2019t click: towards an effective anti-phishing training: a comparative literature review. Human-Centric Comput. Inf. Sci. 10(1), 33 (2020). https:\/\/doi.org\/10.1186\/s13673-020-00237-7","key":"13_CR18","DOI":"10.1186\/s13673-020-00237-7"},{"doi-asserted-by":"publisher","unstructured":"Kumaraguru, P., et al.: School of phish: a real-world evaluation of anti-phishing training. In: Proceedings of the 5th Symposium on Usable Privacy and Security, pp. 1\u201312. ACM, Mountain View (2009). https:\/\/doi.org\/10.1145\/1572532.1572536","key":"13_CR19","DOI":"10.1145\/1572532.1572536"},{"doi-asserted-by":"crossref","unstructured":"Kumaraguru, P., et al.: Getting users to pay attention to anti-phishing education: evaluation of retention and transfer. In: Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit, pp. 70\u201381 (2007)","key":"13_CR20","DOI":"10.1145\/1299015.1299022"},{"doi-asserted-by":"crossref","unstructured":"Kumaraguru, P., Sheng, S., Acquisti, A., Cranor, L.F., Hong, J.: Lessons from a real world evaluation of anti-phishing training. In: 2008 eCrime Researchers Summit, pp. 1\u201312. IEEE (2008)","key":"13_CR21","DOI":"10.1109\/ECRIME.2008.4696970"},{"issue":"2","key":"13_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1754393.1754396","volume":"10","author":"P Kumaraguru","year":"2010","unstructured":"Kumaraguru, P., Sheng, S., Acquisti, A., Cranor, L.F., Hong, J.: Teaching Johnny not to fall for phish. ACM Trans. Internet Technol. 10(2), 1\u201331 (2010). https:\/\/doi.org\/10.1145\/1754393.1754396","journal-title":"ACM Trans. Internet Technol."},{"doi-asserted-by":"publisher","unstructured":"K\u00f6hler, D., P\u00fcnter, W., Meinel, C.: How users investigate phishing emails that lack traditional phishing cues. In: P\u00f6pper, C., Batina, L. (eds.) Applied Cryptography and Network Security. Lecture Notes in Computer Science, vol. 14585, pp. 381\u2013411. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-54776-8_15","key":"13_CR23","DOI":"10.1007\/978-3-031-54776-8_15"},{"doi-asserted-by":"publisher","unstructured":"Lain, D., Kostiainen, K., \u010capkun, S.: Phishing in organizations: findings from a large-scale and long-term study. In: 2022 IEEE Symposium on Security and Privacy, pp. 842\u2013859 (2022).https:\/\/doi.org\/10.1109\/SP46214.2022.9833766","key":"13_CR24","DOI":"10.1109\/SP46214.2022.9833766"},{"doi-asserted-by":"crossref","unstructured":"Li, W., Lee, J., Purl, J., Greitzer, F., Yousefi, B., Laskey, K.: Experimental investigation of demographic factors related to phishing susceptibility. In: Hawaii International Conference on System Sciences (2020). iSBN: 0998133132","key":"13_CR25","DOI":"10.24251\/HICSS.2020.274"},{"issue":"5","key":"13_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3336141","volume":"26","author":"T Lin","year":"2019","unstructured":"Lin, T., et al.: Susceptibility to spear-phishing emails: effects of internet user demographics and email content. ACM Trans. Comput.-Human Interact. 26(5), 1\u201328 (2019). https:\/\/doi.org\/10.1145\/3336141","journal-title":"ACM Trans. Comput.-Human Interact."},{"doi-asserted-by":"publisher","unstructured":"Meinel, C., Willems, C., Staubitz, T., Sauer, D., Hagedorn, C.: openHPI : 10 Years of MOOCs at the Hasso Plattner Institute. Technische Berichte des HPI 148 (2022). https:\/\/doi.org\/10.25932\/publishup-56020","key":"13_CR27","DOI":"10.25932\/publishup-56020"},{"doi-asserted-by":"publisher","unstructured":"Oliveira, D., et al.: Dissecting spear phishing emails for older vs young adults: on the interplay of weapons of influence and life domains in predicting susceptibility to phishing. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, CHI 2017, pp. 6412\u20136424. Association for Computing Machinery, New York (2017). https:\/\/doi.org\/10.1145\/3025453.3025831","key":"13_CR28","DOI":"10.1145\/3025453.3025831"},{"key":"13_CR29","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1007\/978-3-642-39218-4_27","volume-title":"Security and Privacy Protection in Information Processing Systems","author":"K Parsons","year":"2013","unstructured":"Parsons, K., McCormac, A., Pattinson, M., Butavicius, M., Jerram, C.: Phishing for the truth: a scenario-based experiment of users\u2019 behavioural response to emails. In: Janczewski, L.J., Wolfe, H.B., Shenoi, S. (eds.) SEC 2013. IAICT, vol. 405, pp. 366\u2013378. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39218-4_27"},{"key":"13_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/978-3-030-80825-9_17","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"F Quinkert","year":"2021","unstructured":"Quinkert, F., Degeling, M., Holz, T.: Spotlight on phishing: a longitudinal study on phishing awareness trainings. In: Bilge, L., Cavallaro, L., Pellegrino, G., Neves, N. (eds.) DIMVA 2021. LNCS, vol. 12756, pp. 341\u2013360. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-80825-9_17"},{"key":"13_CR31","doi-asserted-by":"publisher","first-page":"135","DOI":"10.3389\/fpsyg.2018.00135","volume":"9","author":"P Rajivan","year":"2018","unstructured":"Rajivan, P., Gonzalez, C.: Creative persuasion: a study on adversarial behaviors and strategies in phishing attacks. Front. Psychol. 9, 135 (2018)","journal-title":"Front. Psychol."},{"doi-asserted-by":"crossref","unstructured":"Rocha\u00a0Flores, W., Holm, H., Nohlberg, M., Ekstedt, M.: Investigating personal determinants of phishing and the effect of national culture. Inf. Comput. Secur. 23(2), 178\u2013199 (2015). iSBN: 2056-4961","key":"13_CR32","DOI":"10.1108\/ICS-05-2014-0029"},{"issue":"4","key":"13_CR33","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1108\/IMCS-11-2013-0083","volume":"22","author":"W Rocha Flores","year":"2014","unstructured":"Rocha Flores, W., Holm, H., Svensson, G., Ericsson, G.: Using phishing experiments and scenario-based surveys to understand security behaviours in practice. Inf. Manag. Comput. Secur. 22(4), 393\u2013406 (2014). https:\/\/doi.org\/10.1108\/IMCS-11-2013-0083","journal-title":"Inf. Manag. Comput. Secur."},{"key":"13_CR34","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2835-7","volume-title":"Advanced Persistent Training: Take Your Security Awareness Program to the Next Level","author":"J Schroeder","year":"2017","unstructured":"Schroeder, J.: Advanced Persistent Training: Take Your Security Awareness Program to the Next Level. Apress, Berkeley (2017)"},{"doi-asserted-by":"publisher","unstructured":"Sheng, S., Holbrook, M., Kumaraguru, P., Cranor, L.F., Downs, J.: Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 373\u2013382. ACM, Atlanta (2010). https:\/\/doi.org\/10.1145\/1753326.1753383","key":"13_CR35","DOI":"10.1145\/1753326.1753383"},{"unstructured":"Siadati, H., Palka, S., Siegel, A., McCoy, D.: Measuring the effectiveness of embedded phishing exercises. In: 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17). USENIX Association, Vancouver (2017). https:\/\/www.usenix.org\/conference\/cset17\/workshop-program\/presentation\/siadatii","key":"13_CR36"},{"doi-asserted-by":"publisher","unstructured":"Simoiu, C., Zand, A., Thomas, K., Bursztein, E.: Who is targeted by email-based phishing and malware? Measuring factors that differentiate risk. In: Proceedings of the ACM Internet Measurement Conference, IMC 2020, pp. 567\u2013576. ACM, New York (2020). https:\/\/doi.org\/10.1145\/3419394.3423617","key":"13_CR37","DOI":"10.1145\/3419394.3423617"},{"unstructured":"Statistisches Bundesamt: Bev\u00f6lkerung und Erwerbst\u00e4tigkeit (2021)","key":"13_CR38"},{"key":"13_CR39","doi-asserted-by":"publisher","first-page":"100540","DOI":"10.1109\/ACCESS.2022.3207272","volume":"10","author":"T Sutter","year":"2022","unstructured":"Sutter, T., Bozkir, A.S., Gehring, B., Berlich, P.: Avoiding the hook: influential factors of phishing awareness training on click-rates and a data-driven approach to predict email difficulty perception. IEEE Access 10, 100540\u2013100565 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3207272","journal-title":"IEEE Access"},{"key":"13_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"564","DOI":"10.1007\/978-3-030-29381-9_35","volume-title":"Human-Computer Interaction \u2013 INTERACT 2019","author":"R Taib","year":"2019","unstructured":"Taib, R., Yu, K., Berkovsky, S., Wiggins, M., Bayl-Smith, P.: Social engineering and organisational dependencies in phishing attacks. In: Lamas, D., et al. (eds.) INTERACT 2019. LNCS, vol. 11746, pp. 564\u2013584. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-29381-9_35"},{"issue":"8","key":"13_CR41","doi-asserted-by":"publisher","first-page":"1146","DOI":"10.1177\/0093650215627483","volume":"45","author":"A Vishwanath","year":"2018","unstructured":"Vishwanath, A., Harrison, B., Ng, Y.J.: Suspicion, cognition, and automaticity model of phishing susceptibility. Commun. Res. 45(8), 1146\u20131166 (2018). https:\/\/doi.org\/10.1177\/0093650215627483","journal-title":"Commun. Res."},{"issue":"3","key":"13_CR42","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1016\/j.dss.2011.03.002","volume":"51","author":"A Vishwanath","year":"2011","unstructured":"Vishwanath, A., Herath, T., Chen, R., Wang, J., Rao, H.R.: Why do people get phished? testing individual differences in phishing vulnerability within an integrated, information processing model. Decis. Support Syst. 51(3), 576\u2013586 (2011). https:\/\/doi.org\/10.1016\/j.dss.2011.03.002","journal-title":"Decis. Support Syst."},{"issue":"2","key":"13_CR43","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/BF02906238","volume":"7","author":"N Wagner","year":"1984","unstructured":"Wagner, N.: Instructional product evaluation using the staged innovation design. J. Instruct. Dev. 7(2), 24\u201327 (1984)","journal-title":"J. Instruct. Dev."},{"key":"13_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ijhcs.2018.06.004","volume":"120","author":"EJ Williams","year":"2018","unstructured":"Williams, E.J., Hinds, J., Joinson, A.N.: Exploring susceptibility to phishing in the workplace. Int. J. Hum. Comput. Stud. 120, 1\u201313 (2018). https:\/\/doi.org\/10.1016\/j.ijhcs.2018.06.004","journal-title":"Int. J. Hum. Comput. Stud."},{"issue":"2","key":"13_CR45","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1080\/0144929X.2018.1519599","volume":"38","author":"EJ Williams","year":"2019","unstructured":"Williams, E.J., Polage, D.: How persuasive is phishing email? the role of authentic design, influence and current events in email judgements. Behav. Inf. Technol. 38(2), 184\u2013197 (2019). https:\/\/doi.org\/10.1080\/0144929X.2018.1519599","journal-title":"Behav. Inf. Technol."}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-75764-8_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T11:07:31Z","timestamp":1729595251000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-75764-8_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,17]]},"ISBN":["9783031757631","9783031757648"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-75764-8_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,10,17]]},"assertion":[{"value":"17 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The study presented in this paper was approved by the Institutional Review Board (IRB) of the University of Potsdam. Participants consented to the study and received disclosure information as soon the study was completed to ensure that a potential bias is not impacting study results. Participant data was collected in pseudonymized form and later anonymized. In Sect.\u00a0, we highlight the the applied measures in detail.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Considerations"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"ISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Arlington, VA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isw2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/isc24.cs.gmu.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}