{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:30:43Z","timestamp":1760661043640,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":87,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031928321"},{"type":"electronic","value":"9783031928338"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-92833-8_17","type":"book-chapter","created":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T00:07:09Z","timestamp":1749514029000},"page":"282-297","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Human and Organizational Dynamics in Responding to Cybersecurity Incidents: Lessons from the Australian Healthcare Sector"],"prefix":"10.1007","author":[{"given":"Hafsa Binte","family":"Umar","sequence":"first","affiliation":[]},{"given":"Tafheem Ahmad","family":"Wani","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Liem","sequence":"additional","affiliation":[]},{"given":"Urooj Raza","family":"Khan","sequence":"additional","affiliation":[]},{"given":"James","family":"Boyd","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,11]]},"reference":[{"issue":"4","key":"17_CR1","doi-asserted-by":"publisher","first-page":"3407","DOI":"10.3390\/ijerph20043407","volume":"20","author":"AI Stoumpos","year":"2023","unstructured":"Stoumpos, A.I., Kitsios, F., Talias, M.A.: Digital transformation in healthcare: technology acceptance and its applications. Int. J. Environ. Res. Public Health 20(4), 3407 (2023)","journal-title":"Int. J. Environ. Res. Public Health"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Yang, D., Karimi, H.R., Kaynak, O., Yin, S.: Developments of digital twin technologies in industrial, smart city and healthcare sectors: a survey. Complex Eng. Syst. 1(1), N\/A (2021)","DOI":"10.20517\/ces.2021.06"},{"key":"17_CR3","unstructured":"Abernethy, A., Adams, L., Barrett, M., Bechtel, C., Brennan, P., Butte, A., et al. The promise of digital health: then, now, and the future. NAM Perspect. 2022 (2022)"},{"issue":"3","key":"17_CR4","doi-asserted-by":"publisher","first-page":"156","DOI":"10.4258\/hir.2016.22.3.156","volume":"22","author":"DV Dimitrov","year":"2016","unstructured":"Dimitrov, D.V.: Medical internet of things and big data in healthcare. Healthcare Inf. Res. 22(3), 156\u2013163 (2016)","journal-title":"Healthcare Inf. Res."},{"key":"17_CR5","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.maturitas.2018.04.008","volume":"113","author":"L Coventry","year":"2018","unstructured":"Coventry, L., Branley, D.: Cybersecurity in healthcare: a narrative review of trends, threats and ways forward. Maturitas 113, 48\u201352 (2018)","journal-title":"Maturitas"},{"issue":"4","key":"17_CR6","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1108\/IMCS-08-2012-0043","volume":"21","author":"K Hedstr\u00f6m","year":"2013","unstructured":"Hedstr\u00f6m, K., Karlsson, F., Kolkowska, E.: Social action theory for understanding information security non-compliance in hospitals: the importance of user rationale. Inf. Manag. Comput. Secur. 21(4), 266\u2013287 (2013)","journal-title":"Inf. Manag. Comput. Secur."},{"key":"17_CR7","volume-title":"Big Data Analytics for Healthcare: Datasets, Techniques, Life Cycles, Management, and Applications","author":"P Keikhosrokiani","year":"2022","unstructured":"Keikhosrokiani, P.: Big Data Analytics for Healthcare: Datasets, Techniques, Life Cycles, Management, and Applications. Academic Press, New York (2022)"},{"issue":"2","key":"17_CR8","first-page":"8","volume":"12","author":"D Schatz","year":"2017","unstructured":"Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber security. J. Digital Forensics Secur. Law 12(2), 8 (2017)","journal-title":"J. Digital Forensics Secur. Law"},{"key":"17_CR9","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/978-3-030-50309-3_8","volume-title":"HCI for Cybersecurity, Privacy and Trust: Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19\u201324, 2020, Proceedings","author":"L Coventry","year":"2020","unstructured":"Coventry, L., et al.: Cyber-risk in healthcare: exploring facilitators and barriers to secure behaviour. In: Moallem, A. (ed.) HCI for Cybersecurity, Privacy and Trust: Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19\u201324, 2020, Proceedings, pp. 105\u2013122. Springer International Publishing, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-50309-3_8"},{"key":"17_CR10","unstructured":"Ponemon, L.: Third Annual Benchmark Study on Patient Privacy & Data Security. Ponemon Institute, Traverse City, MI (2012). https:\/\/www.ponemonorg\/news-2\/45"},{"issue":"10","key":"17_CR11","doi-asserted-by":"publisher","first-page":"742","DOI":"10.7326\/0003-4819-144-10-200605160-00125","volume":"144","author":"B Chaudhry","year":"2006","unstructured":"Chaudhry, B., Wang, J., Wu, S., Maglione, M., Mojica, W., Roth, E., et al.: Systematic review: impact of health information technology on quality, efficiency, and costs of medical care. Ann. Int. Med. 144(10), 742\u2013752 (2006)","journal-title":"Ann. Int. Med."},{"issue":"4","key":"17_CR12","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1177\/1363459319891213","volume":"25","author":"C Botrugno","year":"2021","unstructured":"Botrugno, C.: Information technologies in healthcare: enhancing or dehumanising doctor\u2013patient interaction? Health 25(4), 475\u2013493 (2021)","journal-title":"Health"},{"key":"17_CR13","unstructured":"MIT Technology Review. The Cyber Defense Index 2022\/23. 2023"},{"key":"17_CR14","unstructured":"Wolf A. Arctic Wolf [Internet] (2023). Accessed 31 July 2024. https:\/\/arcticwolf.com\/resources\/blog\/australia-reforming-cybersecurity-rules\/"},{"key":"17_CR15","unstructured":"Department of Home Affairs. 2023\u20132030 Australian Cyber Security Strategy. In: Affairs DoH, editor (2023)"},{"key":"17_CR16","unstructured":"OAIC. Notifiable data breaches report July to December 2023. In: Commissioner OotAI, editor (2023)"},{"key":"17_CR17","unstructured":"OAIC. Notifiable Data Breaches Report- January to June 2024. In: OAIC, editor (2024)"},{"key":"17_CR18","unstructured":"OAIC. Notifiable Data Breaches Report: January to June 2022. In: Commissioner OotAI, editor (2022"},{"key":"17_CR19","unstructured":"OAIC. Notifiable Data Breaches Report: January to June 2023. In: Commissioner OotAI, editor (2023)"},{"key":"17_CR20","unstructured":"OAIC. Notifiable Data Breaches Report: January\u2013June 2020. In: Commissioner OotAI, editor (2020)"},{"key":"17_CR21","unstructured":"OAIC. Notifiable Data Breaches Report: January\u2013June 2021. In: Commissioner OotAI, editor (2021)"},{"key":"17_CR22","unstructured":"OAIC. Notifiable Data Breaches Report: July to December 2022. In: Commissioner OotAI, editor (2022)"},{"key":"17_CR23","unstructured":"OAIC. Notifiable Data Breaches Report: July\u2013December 2020. In: Commissioner OotAI, editor (2020)"},{"key":"17_CR24","unstructured":"OAIC. Notifiable Data Breaches Report: July\u2013December 2021. In: Commissioner OotAI, editor (2021)"},{"key":"17_CR25","volume":"9","author":"E Field","year":"2021","unstructured":"Field, E., Dyda, A., Hewett, M., Weng, H., Shi, J., Curtis, S., et al.: Development of the COVID-19 real-time information system for preparedness and epidemic response (CRISPER), Australia. Front. 9, 753493 (2021)","journal-title":"Front."},{"key":"17_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102248","volume":"105","author":"HS Lallie","year":"2021","unstructured":"Lallie, H.S., Shepherd, L.A., Nurse, J.R., Erola, A., Epiphaniou, G., Maple, C., et al.: Cyber security in the age of COVID-19: a timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Comput. Secur. 105, 102248 (2021)","journal-title":"Comput. Secur."},{"issue":"11","key":"17_CR27","doi-asserted-by":"publisher","first-page":"490","DOI":"10.5694\/mja2.50869","volume":"213","author":"Ying Zhang","year":"2020","unstructured":"Zhang, Ying, et al.: The 2020 special report of the MJA\u2013lancet countdown on health and climate change: lessons learnt from Australia\u2019s \u201cBlack Summer.\u201d Med J. Aust. 213(11), 490 (2020). https:\/\/doi.org\/10.5694\/mja2.50869","journal-title":"Med J. Aust."},{"key":"17_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102398","volume":"109","author":"R Smith","year":"2021","unstructured":"Smith, R., Janicke, H., He, Y., Ferra, F., Albakri, A.: The agile incident response for industrial control systems (AIR4ICS) framework. Comput. Secur. 109, 102398 (2021)","journal-title":"Comput. Secur."},{"issue":"5","key":"17_CR29","first-page":"1","volume":"10","author":"S Schlarman","year":"2001","unstructured":"Schlarman, S.: The people, policy, technology (PPT) model: core elements of the security process. Inf. Syst. Secur. 10(5), 1\u20136 (2001)","journal-title":"Inf. Syst. Secur."},{"key":"17_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2024.105606","volume":"192","author":"TA Wani","year":"2024","unstructured":"Wani, T.A., Mendoza, A., Gray, K.: BYOD security behaviour and preferences among hospital clinicians \u2013 a qualitative study. Int. J. Med. Inf. 192, 105606 (2024)","journal-title":"Int. J. Med. Inf."},{"issue":"1","key":"17_CR31","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1093\/jamia\/ocy148","volume":"26","author":"MS Jalali","year":"2019","unstructured":"Jalali, M.S., Russell, B., Razak, S., Gordon, W.J.: EARS to cyber incidents in health care. J. Am. Med. Inform. Assoc. 26(1), 81\u201390 (2019)","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"17_CR32","doi-asserted-by":"crossref","unstructured":"Offner, K., Sitnikova, E., Joiner, K., MacIntyre, C.: Towards understanding cybersecurity capability in Australian healthcare organisations: a systematic review of recent trends, threats and mitigation. Health Secur. Intell., 92\u2013121 (2021)","DOI":"10.4324\/9781003245483-8"},{"issue":"1","key":"17_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3233\/THC-161263","volume":"25","author":"CS Kruse","year":"2017","unstructured":"Kruse, C.S., Frederick, B., Jacobson, T., Monticone, D.K.: Cybersecurity in healthcare: a systematic review of modern threats and trends. Technol. Health Care 25(1), 1\u201310 (2017)","journal-title":"Technol. Health Care"},{"key":"17_CR34","doi-asserted-by":"crossref","unstructured":"Sittig, D.F., Singh, H.: A new sociotechnical model for studying health information technology in complex adaptive healthcare systems. Qual. Saf. Health Care. 19(Suppl 3), i68\u2013i74 (2010)","DOI":"10.1136\/qshc.2010.042085"},{"issue":"4","key":"17_CR35","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1111\/ijmr.12102","volume":"19","author":"RJ Adams","year":"2017","unstructured":"Adams, R.J., Smart, P., Huff, A.S.: Shades of grey: guidelines for working with the grey literature in systematic reviews for management and organizational studies. Int. J. Manag. Rev. 19(4), 432\u2013454 (2017)","journal-title":"Int. J. Manag. Rev."},{"key":"17_CR36","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.infsof.2018.09.006","volume":"106","author":"V Garousi","year":"2019","unstructured":"Garousi, V., Felderer, M., M\u00e4ntyl\u00e4, M.V.: Guidelines for including grey literature and conducting multivocal literature reviews in software engineering. Inf. Softw. Technol. 106, 101\u2013121 (2019)","journal-title":"Inf. Softw. Technol."},{"issue":"7","key":"17_CR37","doi-asserted-by":"publisher","first-page":"467","DOI":"10.7326\/M18-0850","volume":"169","author":"AC Tricco","year":"2018","unstructured":"Tricco, A.C., Lillie, E., Zarin, W., O\u2019Brien, K.K., Colquhoun, H., Levac, D., et al.: PRISMA extension for scoping reviews (PRISMA-ScR): checklist and explanation. Ann. Intern. Med. 169(7), 467\u2013473 (2018)","journal-title":"Ann. Intern. Med."},{"key":"17_CR38","doi-asserted-by":"crossref","unstructured":"Peters, M., Godfrey, C., McInerney, P., Munn, Z., Tricco, A., Khalil, H.: Scoping reviews. In: Aromataris, E., Lockwood, C., Porritt, K., Pilla, B., Jordan, Z. (eds). JBI (2020)","DOI":"10.46658\/JBIRM-20-01"},{"key":"17_CR39","unstructured":"Bucci, N.: Drug and alcohol tests of graduate paramedics revealed in Ambulance Victoria data breach. Guardian (2023)"},{"key":"17_CR40","unstructured":"Another AV Privacy Breach \u2013 Three Strikes but NO ACCOUNTABILITY [press release] (2024)"},{"key":"17_CR41","unstructured":"Anderson, A.: Employee records exposed in Ambulance Victoria data breach. Newscom (2023)"},{"key":"17_CR42","unstructured":"Notice relating to privacy breach [press release] (2023)"},{"key":"17_CR43","unstructured":"Pearson, N.: Paramedics\u2019 drug and alcohol history exposed in Victorian data breach (2023)"},{"key":"17_CR44","unstructured":"Elliot, T.: The Alfred CEO \u2018can\u2019t guarantee\u2019 alarming data breach is an isolated incident. 3AW MELBOURNE (2023)"},{"key":"17_CR45","unstructured":"Privacy central to patient trust [press release] (2023)"},{"key":"17_CR46","unstructured":"Nadal, J.: Regis Aged Care upgrades endpoint security. iTNews (2023)"},{"key":"17_CR47","unstructured":"Regis Healthcare Response to Cyber Incident [press release] (2020)"},{"key":"17_CR48","unstructured":"Cooper, E.: Cybersecurity expert calls for replacement technology following Tasmanian ambulance patient data leak. ABC News (2021)"},{"key":"17_CR49","unstructured":"Ang, A.: St Vincent's says no sensitive data stolen after IT breach and more briefs. Healthcare IT News (2024)"},{"key":"17_CR50","unstructured":"Media Statement - Cyber incident update [press release] (2023)"},{"key":"17_CR51","unstructured":"July update about Cyber Incident Recovery and Patient Information Security [press release]. 2024"},{"key":"17_CR52","unstructured":"Theocharus M. Patients in the dark after cyberattack forces closure of radiology clinic. 9 News (2023)"},{"key":"17_CR53","unstructured":"McDonald, K.: Eastern Health restores systems, confirms ransomware attack. PULSE+IT (2021)"},{"key":"17_CR54","unstructured":"McDonald, K.: Eastern Health still weathering fallout from cyber event. PULSE+IT (2021)"},{"key":"17_CR55","unstructured":"Hitch, G.: Medibank admits personal data stolen in cyber attack. ABC News (2022)"},{"key":"17_CR56","unstructured":"McDonald, K.: Medibank confirms claims data and personal information stolen by hackers. PULSE+IT (2022)"},{"key":"17_CR57","unstructured":"McDonald K. Medibank hack extends to core business customers. PULSE+IT. 2022"},{"key":"17_CR58","unstructured":"MediSecure statement on cyber security incident [press release] (2024)"},{"key":"17_CR59","unstructured":"OAIC. Statement on MediSecure data breach. In: OAIC, editor (2024)"},{"key":"17_CR60","unstructured":"OAIC. Statement regarding reported health data breach in Western Australia (2020)"},{"key":"17_CR61","unstructured":"Formal Notification [press release] (2023)"},{"key":"17_CR62","unstructured":"Frontier Software cyber attack and data breach [press release] (2023)"},{"key":"17_CR63","unstructured":"McDonald, K.: Medibank hack worse than thought with customer database potentially accessed. PULSE+IT (2022)"},{"key":"17_CR64","unstructured":"Bernardone, L.: Medibank receives contact from hackers. INFORMATIONAGE (2022)"},{"key":"17_CR65","unstructured":"iTNews. Medibank's staff details stolen after property manager faces cyber breach. iTNews (2023)"},{"key":"17_CR66","unstructured":"Cyber sanctions in response to Medibank Private cyber attack [press release] (2022)"},{"key":"17_CR67","unstructured":"McDonald, K.: Feds unleash Magnitsky sanctions on Medibank health fund data thief. PULSE+IT (2024)"},{"key":"17_CR68","unstructured":"McDonald, K.: Information commissioner acts against ACL over Medlab breach. PULSE+IT (2023)"},{"key":"17_CR69","doi-asserted-by":"crossref","unstructured":"Othman, M.B.B., Samah, M.F.B.A.: The Australian privacy act 1988: lesson to be learned. Malay. J. Soc. Sci. Human. (MJSSH) 7(9), e001766-e (2022)","DOI":"10.47405\/mjssh.v7i9.1766"},{"key":"17_CR70","unstructured":"Pearson, N.: Health care giant Medibank sued over data breach that affected 9.7m people. 9NEWS (2023)"},{"key":"17_CR71","unstructured":"Terzon, E.: Australian Clinical Labs accused of \u2018sitting on\u2019 hack that saw patient data posted to the dark web. ABC News (2022)"},{"key":"17_CR72","unstructured":"NSW Health. Accellion software cyber attack (2021)"},{"key":"17_CR73","unstructured":"McDonald, K.: NSW Health confirms personal data has been accessed following Accellion hack. PULSE+IT (2021)"},{"key":"17_CR74","unstructured":"QIMR Berghofer investigates suspected Accellion data breach [press release] (2021)"},{"key":"17_CR75","unstructured":"NSW Health. Accellion software cyber attack - Frequently asked questions. In: Health N, editor (2021)"},{"key":"17_CR76","unstructured":"McDonald K. Information commissioner acts against ACL over Medlab breach. PULSE+IT (2023)"},{"key":"17_CR77","unstructured":"McDonald, K.: \u2018Final\u2019 data dump from Medibank hack released. PULSE+IT (2022)"},{"key":"17_CR78","unstructured":"Crozier, R.: UnitingCare Queensland hit by cyber attack. iTNews (2021)"},{"issue":"4","key":"17_CR79","doi-asserted-by":"publisher","DOI":"10.2196\/21747","volume":"23","author":"Y He","year":"2021","unstructured":"He, Y., Aliyu, A., Evans, M., Luo, C.: Health care cybersecurity challenges and solutions under the climate of COVID-19: Scoping review. J. Med. Internet Res. 23(4), e21747 (2021)","journal-title":"J. Med. Internet Res."},{"key":"17_CR80","doi-asserted-by":"crossref","unstructured":"Guidetti, O.: Psybersecurity: human factors of cyber defence. In: Ahmed, M., Speelman, C. (eds.) 1st. edn. Taylor & Francis Group, Boca Raton (2024)","DOI":"10.1201\/9781032664859"},{"key":"17_CR81","unstructured":"Federal Register of Legislation. The Privacy Act 1988. In: Legislation FRo, editor (2024)"},{"key":"17_CR82","unstructured":"OAIC. About the Notifiable Data Breaches scheme. In: Commissioner OotAI, editor (2024)"},{"issue":"5","key":"17_CR83","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/s10916-019-1507-y","volume":"44","author":"SS Bhuyan","year":"2020","unstructured":"Bhuyan, S.S., Kabir, U.Y., Escareno, J.M., Ector, K., Palakodeti, S., Wyant, D., et al.: Transforming healthcare cybersecurity from reactive to proactive: current status and future recommendations. J. Med. Syst. 44(5), 98 (2020)","journal-title":"J. Med. Syst."},{"key":"17_CR84","unstructured":"Marongiu, M.: Key to proactive cyber security is management of third-party vendor risks. Insur. J. (2023)"},{"key":"17_CR85","unstructured":"Cooney, M.: IBM leans into AI for managed security services: New threat detection and response services from IBM leverage AI models that learn from real-world client data and are engineered to automatically close low priority and false positive alerts based on enterprise-defined parameters. Network World (Online) (2023)"},{"issue":"3","key":"17_CR86","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1053\/j.semvascsurg.2023.06.002","volume":"36","author":"A Alonso","year":"2023","unstructured":"Alonso, A., Siracuse, J.J.: Protecting patient safety and privacy in the era of artificial intelligence. Semin. Vasc. Surg. 36(3), 426\u2013429 (2023)","journal-title":"Semin. Vasc. Surg."},{"key":"17_CR87","doi-asserted-by":"crossref","unstructured":"Roski, J., Maier, E.J., Vigilante, K., Kane, E.A., Matheny, M.E.: Enhancing trust in AI through industry self-governance. J. Am. Med. Inform. Assoc. 28(7), 1582\u20131590 (2021)","DOI":"10.1093\/jamia\/ocab065"}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-92833-8_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T17:22:40Z","timestamp":1760635360000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-92833-8_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031928321","9783031928338"],"references-count":87,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-92833-8_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"11 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gothenburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2025.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}