{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:25:55Z","timestamp":1759332355668,"version":"3.40.3"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031815720"},{"type":"electronic","value":"9783031815737"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-81573-7_16","type":"book-chapter","created":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T09:39:24Z","timestamp":1739353164000},"page":"190-208","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Financial Fraud Detection Using Rich Mobile Money Transaction Datasets"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8932-5762","authenticated-orcid":false,"given":"Denish","family":"Azamuke","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4718-4209","authenticated-orcid":false,"given":"Marriette","family":"Katarahweire","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3304-4144","authenticated-orcid":false,"given":"Engineer","family":"Bainomugisha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,13]]},"reference":[{"key":"16_CR1","doi-asserted-by":"publisher","first-page":"937","DOI":"10.1007\/s13198-016-0551-y","volume":"8","author":"AO Adewumi","year":"2017","unstructured":"Adewumi, A.O., Akinyelu, A.A.: A survey of machine-learning and nature-inspired based credit card fraud detection techniques. Int. J. Syst. Assur. Eng. Manag. 8, 937\u2013953 (2017). https:\/\/doi.org\/10.1007\/s13198-016-0551-y","journal-title":"Int. J. Syst. Assur. Eng. Manag."},{"key":"16_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.120144","volume":"227","author":"SZ Aftabi","year":"2023","unstructured":"Aftabi, S.Z., Ahmadi, A., Farzi, S.: Fraud detection in financial statements using data mining and gan models. Expert Syst. Appl. 227, 120144 (2023). https:\/\/doi.org\/10.1016\/j.eswa.2023.120144","journal-title":"Expert Syst. Appl."},{"issue":"4","key":"16_CR3","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1080\/19361610.2020.1815491","volume":"15","author":"Y Alghofaili","year":"2020","unstructured":"Alghofaili, Y., Albattah, A., Rassam, M.A.: A financial fraud detection model based on lstm deep learning technique. J. Appl. Secur. Res. 15(4), 498\u2013516 (2020). https:\/\/doi.org\/10.1080\/19361610.2020.1815491","journal-title":"J. Appl. Secur. Res."},{"issue":"4","key":"16_CR4","doi-asserted-by":"publisher","first-page":"2272","DOI":"10.3390\/app13042272","volume":"13","author":"AA Ali","year":"2023","unstructured":"Ali, A.A., Khedr, A.M., El-Bannany, M., Kanakkayil, S.: A powerful predicting model for financial statement fraud based on optimized xgboost ensemble learning technique. Appl. Sci. 13(4), 2272 (2023). https:\/\/doi.org\/10.3390\/app13042272","journal-title":"Appl. Sci."},{"issue":"6","key":"16_CR5","doi-asserted-by":"publisher","first-page":"309","DOI":"10.3390\/info11060309","volume":"11","author":"G Ali","year":"2020","unstructured":"Ali, G., Ally Dida, M., Elikana Sam, A.: Evaluation of key security issues associated with mobile money systems in Uganda. Information 11(6), 309 (2020). https:\/\/doi.org\/10.3390\/info11060309","journal-title":"Information"},{"doi-asserted-by":"publisher","unstructured":"Apiors, E.K., Suzuki, A.: Effects of mobile money education on mobile money usage: Evidence from ghana. Eur. J. Dev. Res. 1\u201328 (2022). https:\/\/doi.org\/10.1057\/s41287-022-00529-x","key":"16_CR6","DOI":"10.1057\/s41287-022-00529-x"},{"doi-asserted-by":"publisher","unstructured":"Aslam, N., et al.: Anomaly detection using explainable random forest for the prediction of undesirable events in oil wells. Appl. Comput. Intell. Soft Comput. 2022 (2022). https:\/\/doi.org\/10.1155\/2022\/1558381","key":"16_CR7","DOI":"10.1155\/2022\/1558381"},{"key":"16_CR8","series-title":"Smart Innovation, Systems and Technologies","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/978-981-16-3675-2_24","volume-title":"Ubiquitous Intelligent Systems","author":"M Aswathi","year":"2022","unstructured":"Aswathi, M., Ghosh, A., Namboothiri, L.V.: Borda count versus majority voting for credit card fraud detection. In: Karuppusamy, P., Perikos, I., Garc\u00eda M\u00e1rquez, F.P. (eds.) Ubiquitous Intelligent Systems. SIST, vol. 243, pp. 319\u2013330. Springer, Singapore (2022). https:\/\/doi.org\/10.1007\/978-981-16-3675-2_24"},{"key":"16_CR9","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.procs.2020.06.014","volume":"173","author":"S Bagga","year":"2020","unstructured":"Bagga, S., Goyal, A., Gupta, N., Goyal, A.: Credit card fraud detection using pipeling and ensemble learning. Procedia Comput. Sci. 173, 104\u2013112 (2020). https:\/\/doi.org\/10.1016\/j.procs.2020.06.014","journal-title":"Procedia Comput. Sci."},{"issue":"8","key":"16_CR10","doi-asserted-by":"publisher","first-page":"383","DOI":"10.3390\/info11080383","volume":"11","author":"FE Botchey","year":"2020","unstructured":"Botchey, F.E., Qin, Z., Hughes-Lartey, K.: Mobile money fraud prediction\u2019a cross-case analysis on the efficiency of support vector machines, gradient boosted decision trees, and na\u00efve bayes algorithms. Information 11(8), 383 (2020). https:\/\/doi.org\/10.3390\/info11080383","journal-title":"Information"},{"issue":"2","key":"16_CR11","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1108\/AJIM-11-2021-0339","volume":"75","author":"N Chhabra Roy","year":"2023","unstructured":"Chhabra Roy, N., Prabhakaran, S.: Internal-led cyber frauds in Indian banks: an effective machine learning-based defense system to fraud detection, prioritization and prevention. Aslib J. Inf. Manag. 75(2), 246\u2013296 (2023). https:\/\/doi.org\/10.1108\/AJIM-11-2021-0339","journal-title":"Aslib J. Inf. Manag."},{"doi-asserted-by":"publisher","unstructured":"Chicco, D., Jurman, G.: An invitation to greater use of matthews correlation coefficient (mcc) in robotics and artificial intelligence. Front. Rob. AI,\u00a078 (2022). https:\/\/doi.org\/10.3389\/frobt.2022.876814","key":"16_CR12","DOI":"10.3389\/frobt.2022.876814"},{"key":"16_CR13","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.simpat.2018.09.002","volume":"89","author":"G Cordasco","year":"2018","unstructured":"Cordasco, G., Scarano, V., Spagnuolo, C.: Distributed mason: a scalable distributed multi-agent simulation environment. Simul. Model. Pract. Theory 89, 15\u201334 (2018). https:\/\/doi.org\/10.1016\/j.simpat.2018.09.002","journal-title":"Simul. Model. Pract. Theory"},{"issue":"1","key":"16_CR14","doi-asserted-by":"publisher","first-page":"13","DOI":"10.2174\/2213275907666141101001436","volume":"8","author":"P Danenas","year":"2015","unstructured":"Danenas, P.: Intelligent financial fraud detection and analysis: a survey of recent patents. Recent Patents Comput. Sci. 8(1), 13\u201323 (2015)","journal-title":"Recent Patents Comput. Sci."},{"doi-asserted-by":"publisher","unstructured":"Dighe, D., Patil, S., Kokate, S.: Detection of credit card fraud transactions using machine learning algorithms and neural networks: a comparative study. In: 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), pp.\u00a01\u20136. IEEE (2018). https:\/\/doi.org\/10.1109\/ICCUBEA.2018.8697799","key":"16_CR15","DOI":"10.1109\/ICCUBEA.2018.8697799"},{"key":"16_CR16","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/11423355_22","volume-title":"Engineering Societies in the Agents World V","author":"M Fehler","year":"2005","unstructured":"Fehler, M., Kl\u00fcgl, F., Puppe, F.: Techniques for analysis and calibration of multi-agent simulations. In: Gleizes, M.-P., Omicini, A., Zambonelli, F. (eds.) ESAW 2004. LNCS (LNAI), vol. 3451, pp. 305\u2013321. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11423355_22"},{"unstructured":"Gelb, A., Mukherjee, A.: Digital technology in social assistance transfers for covid-19 relief: lessons from selected cases. CGD Policy Paper 181 (2020)","key":"16_CR17"},{"issue":"3","key":"16_CR18","doi-asserted-by":"publisher","DOI":"10.1002\/isd2.12181","volume":"88","author":"F Kanobe","year":"2022","unstructured":"Kanobe, F., Bwalya, K.J.: Snags in mobile money in developing economies. Electron. J. Inf. Syst. Dev. Countries 88(3), e12181 (2022). https:\/\/doi.org\/10.1002\/isd2.12181","journal-title":"Electron. J. Inf. Syst. Dev. Countries"},{"issue":"1","key":"16_CR19","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1186\/s13040-023-00330-4","volume":"16","author":"T Kosolwattana","year":"2023","unstructured":"Kosolwattana, T., Liu, C., Hu, R., Han, S., Chen, H., Lin, Y.: A self-inspected adaptive smote algorithm (sasmote) for highly imbalanced data classification in healthcare. BioData Mining 16(1), 15 (2023). https:\/\/doi.org\/10.1186\/s13040-023-00330-4","journal-title":"BioData Mining"},{"issue":"4","key":"16_CR20","doi-asserted-by":"publisher","first-page":"899","DOI":"10.1007\/s12571-020-01062-7","volume":"12","author":"L Lawson-Lartego","year":"2020","unstructured":"Lawson-Lartego, L., Cohen, M.J.: 10 recommendations for African governments to ensure food security for poor and vulnerable populations during covid-19. Food Secur. 12(4), 899\u2013902 (2020). https:\/\/doi.org\/10.1007\/s12571-020-01062-7","journal-title":"Food Secur."},{"key":"16_CR21","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1016\/j.engappai.2018.10.008","volume":"77","author":"J Lin","year":"2019","unstructured":"Lin, J.: Backtracking search based hyper-heuristic for the flexible job-shop scheduling problem with fuzzy processing time. Eng. Appl. Artif. Intell. 77, 186\u2013196 (2019). https:\/\/doi.org\/10.1016\/j.engappai.2018.10.008","journal-title":"Eng. Appl. Artif. Intell."},{"key":"16_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.mlwa.2022.100269","volume":"8","author":"ME Lokanan","year":"2022","unstructured":"Lokanan, M.E., Sharma, K.: Fraud prediction using machine learning: the case of investment advisors in Canada. Mach. Learn. Appl. 8, 100269 (2022). https:\/\/doi.org\/10.1016\/j.mlwa.2022.100269","journal-title":"Mach. Learn. Appl."},{"unstructured":"Lopez-Rojas, E., Elmir, A., Axelsson, S.: PaySim: a financial mobile money simulator for fraud detection. In: 28th European Modeling and Simulation Symposium, EMSS, Larnaca, pp. 249\u2013255. Dime University of Genoa (2016)","key":"16_CR23"},{"key":"16_CR24","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1007\/978-3-030-22868-2_51","volume-title":"Intelligent Computing","author":"EA Lopez-Rojas","year":"2019","unstructured":"Lopez-Rojas, E.A., Barneaud, C.: Advantages of the PaySim simulator for improving financial fraud controls. In: Arai, K., Bhatia, R., Kapoor, S. (eds.) CompCom 2019. AISC, vol. 998, pp. 727\u2013736. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-22868-2_51"},{"unstructured":"Lopez-Rojas, E.A.: Extending the retsim simulator for estimating the cost of fraud in the retail store domain. In: The 27th European Modeling and Simulation Symposium-EMSS, Bergeggi, Italy (2015)","key":"16_CR25"},{"issue":"4","key":"16_CR26","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1504\/IJSPM.2018.093756","volume":"13","author":"EA Lopez-Rojas","year":"2018","unstructured":"Lopez-Rojas, E.A., Axelsson, S., Baca, D.: Analysis of fraud controls using the PaySim financial simulator. Int. J. Simul. Process Model. 13(4), 377\u2013386 (2018). https:\/\/doi.org\/10.1504\/IJSPM.2018.093756","journal-title":"Int. J. Simul. Process Model."},{"key":"16_CR27","doi-asserted-by":"publisher","first-page":"1909","DOI":"10.1007\/s00500-010-0625-8","volume":"15","author":"J Luengo","year":"2011","unstructured":"Luengo, J., Fern\u00e1ndez, A., Garc\u00eda, S., Herrera, F.: Addressing data complexity for imbalanced data sets: analysis of smote-based oversampling and evolutionary undersampling. Soft. Comput. 15, 1909\u20131936 (2011). https:\/\/doi.org\/10.1007\/s00500-010-0625-8","journal-title":"Soft. Comput."},{"issue":"7","key":"16_CR28","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1177\/0037549705058073","volume":"81","author":"S Luke","year":"2005","unstructured":"Luke, S., Cioffi-Revilla, C., Panait, L., Sullivan, K., Balan, G.: Mason: a multiagent simulation environment. Simulation 81(7), 517\u2013527 (2005). https:\/\/doi.org\/10.1177\/0037549705058073","journal-title":"Simulation"},{"key":"16_CR29","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-030-22270-3_6","volume-title":"Multi-Agent-Based Simulation XIX","author":"S Luke","year":"2019","unstructured":"Luke, S., et al.: The MASON simulation toolkit: past, present, and future. In: Davidsson, P., Verhagen, H. (eds.) MABS 2018. LNCS (LNAI), vol. 11463, pp. 75\u201386. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-22270-3_6"},{"unstructured":"MoMTSim, Inc: Mobile Money Transaction Simulator (2023). https:\/\/github.com\/aiinfinancegroup\/MoMTSim, version 0.1.0","key":"16_CR30"},{"unstructured":"Mudiri, J.L.: Fraud in mobile financial services. Rapport technique, MicroSave 30 (2013)","key":"16_CR31"},{"doi-asserted-by":"publisher","unstructured":"Muthali, A., et al.: Multi-agent reachability calibration with conformal prediction. arXiv preprint arXiv:2304.00432 (2023). https:\/\/doi.org\/10.48550\/arXiv.2304.00432","key":"16_CR32","DOI":"10.48550\/arXiv.2304.00432"},{"doi-asserted-by":"publisher","unstructured":"Narayan, A., Madhu\u00a0Kumar, S., Chacko, A.M.: A review of financial fraud detection in e-commerce using machine learning. In: Intelligent Data Engineering and Analytics: Proceedings of the 10th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA 2022), pp. 237\u2013248. Springer, Heidelberg (2023). https:\/\/doi.org\/10.1007\/978-981-19-7524-0_21","key":"16_CR33","DOI":"10.1007\/978-981-19-7524-0_21"},{"key":"16_CR34","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2022.3209827","author":"IK Nti","year":"2022","unstructured":"Nti, I.K., Somanathan, A.R.: A scalable rf-xgboost framework for financial fraud mitigation. IEEE Trans. Comput. Social Syst. (2022). https:\/\/doi.org\/10.1109\/TCSS.2022.3209827","journal-title":"IEEE Trans. Comput. Social Syst."},{"key":"16_CR35","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-3-030-70416-2_26","volume-title":"ITNG 2021 18th International Conference on Information Technology-New Generations","author":"RPM Nunes","year":"2021","unstructured":"Nunes, R.P.M., Bonacin, R., de Franco Rosa, F.: Methods for detecting fraud in civil and military service examinations: a systematic mapping. In: Latifi, S. (ed.) ITNG 2021 18th International Conference on Information Technology-New Generations. AISC, vol. 1346, pp. 203\u2013208. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-70416-2_26"},{"doi-asserted-by":"publisher","unstructured":"\u00d6zt\u00fcrk, M.S., Usul, H.: Detection of accounting frauds using the rule-based expert systems within the scope of forensic accounting. In: Contemporary Issues in Audit Management and Forensic Accounting, vol.\u00a0102, pp. 155\u2013171. Emerald Publishing Limited (2020). https:\/\/doi.org\/10.1108\/S1569-375920200000102013","key":"16_CR36","DOI":"10.1108\/S1569-375920200000102013"},{"issue":"1","key":"16_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-023-00715-6","volume":"10","author":"J Park","year":"2023","unstructured":"Park, J., Kwon, S., Jeong, S.P.: A study on improving turnover intention forecasting by solving imbalanced data problems: focusing on smote and generative adversarial networks. J. Big Data 10(1), 1\u201316 (2023). https:\/\/doi.org\/10.1186\/s40537-023-00715-6","journal-title":"J. Big Data"},{"doi-asserted-by":"publisher","unstructured":"Powers, D.M.: Evaluation: from precision, recall and f-measure to roc, informedness, markedness and correlation. arXiv preprint arXiv:2010.16061 (2020). https:\/\/doi.org\/10.48550\/arXiv.2010.16061","key":"16_CR38","DOI":"10.48550\/arXiv.2010.16061"},{"doi-asserted-by":"publisher","unstructured":"Raiter, O.: Applying supervised machine learning algorithms for fraud detection in anti-money laundering. J. Modern Issues Bus. Res. 1(1), 14\u201326 (2021). https:\/\/doi.org\/10.17613\/2g0z-0814","key":"16_CR39","DOI":"10.17613\/2g0z-0814"},{"key":"16_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2023.122527","volume":"192","author":"T Shahana","year":"2023","unstructured":"Shahana, T., Lavanya, V., Bhat, A.R.: State of the art in financial statement fraud detection: a systematic review. Technol. Forecast. Soc. Chang. 192, 122527 (2023). https:\/\/doi.org\/10.1016\/j.techfore.2023.122527","journal-title":"Technol. Forecast. Soc. Chang."},{"doi-asserted-by":"publisher","unstructured":"Singh, A., Jain, A., Biable, S.E.: Financial fraud detection approach based on firefly optimization algorithm and support vector machine. Appl. Comput. Intell. Soft Comput. 2022 (2022). https:\/\/doi.org\/10.1155\/2022\/1468015","key":"16_CR41","DOI":"10.1155\/2022\/1468015"},{"key":"16_CR42","doi-asserted-by":"publisher","DOI":"10.1016\/j.accinf.2019.06.001","volume":"34","author":"K Singh","year":"2019","unstructured":"Singh, K., Best, P.: Anti-money laundering: using data visualization to identify suspicious activity. Int. J. Account. Inf. Syst. 34, 100418 (2019). https:\/\/doi.org\/10.1016\/j.accinf.2019.06.001","journal-title":"Int. J. Account. Inf. Syst."},{"doi-asserted-by":"publisher","unstructured":"Somepalli, G., Goldblum, M., Schwarzschild, A., Bruss, C.B., Goldstein, T.: Saint: improved neural networks for tabular data via row attention and contrastive pre-training. arXiv preprint arXiv:2106.01342 (2021). https:\/\/doi.org\/10.48550\/arXiv.2106.01342","key":"16_CR43","DOI":"10.48550\/arXiv.2106.01342"},{"issue":"1","key":"16_CR44","first-page":"7","volume":"4","author":"VD Soni","year":"2019","unstructured":"Soni, V.D.: Role of artificial intelligence in combating cyber threats in banking. Int. Eng. J. Res. Dev. 4(1), 7\u20137 (2019)","journal-title":"Int. Eng. J. Res. Dev."},{"doi-asserted-by":"publisher","unstructured":"Tang, Q., et al.: Prediction of casing damage in unconsolidated sandstone reservoirs using machine learning algorithms. In: 2019 IEEE International Conference on Computation, Communication and Engineering (ICCCE), pp. 185\u2013188. IEEE (2019). https:\/\/doi.org\/10.1109\/ICCCE48422.2019.9010785","key":"16_CR45","DOI":"10.1109\/ICCCE48422.2019.9010785"},{"doi-asserted-by":"publisher","unstructured":"Zhang, Y., Tong, J., Wang, Z., Gao, F.: Customer transaction fraud detection using xgboost model. In: 2020 International Conference on Computer Engineering and Application (ICCEA), pp. 554\u2013558. IEEE (2020). https:\/\/doi.org\/10.1109\/ICCEA50009.2020.00122","key":"16_CR46","DOI":"10.1109\/ICCEA50009.2020.00122"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Towards new e-Infrastructure and e-Services for Developing Countries"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-81573-7_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T09:39:32Z","timestamp":1739353172000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-81573-7_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031815720","9783031815737"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-81573-7_16","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"13 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AFRICOMM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on e-Infrastructure and e-Services for Developing Countries","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bobo-Dioulasso","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Burkina Faso","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"africom2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/africommconference.eai-conferences.org\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}