{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T02:42:55Z","timestamp":1772764975216,"version":"3.50.1"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031928321","type":"print"},{"value":"9783031928338","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-92833-8_18","type":"book-chapter","created":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T00:06:57Z","timestamp":1749514017000},"page":"298-312","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Inside the Threat Matrix: Using Hybrid Computer Simulations to Educate Adults on Malicious Insider Threat and Technology Misuse"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8143-289X","authenticated-orcid":false,"given":"Monica T.","family":"Whitty","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1046-205X","authenticated-orcid":false,"given":"Dinislam","family":"Abdulgalimov","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2841-7580","authenticated-orcid":false,"given":"Patrick","family":"Oliver","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9073-781X","authenticated-orcid":false,"given":"Christoper","family":"Ruddy","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4589-2095","authenticated-orcid":false,"given":"Joshua","family":"Seguin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0628-0931","authenticated-orcid":false,"given":"Garry","family":"Young","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,11]]},"reference":[{"key":"18_CR1","doi-asserted-by":"publisher","unstructured":"Almomani, E., Sullivan, J., Saadeh, O., Mustafa, E., Pattison, N. Alinier, G.: Reflective learning conversations model for simulation debriefing: a co-design process and development innovation. BMC Med. Educ. 23, 837 (2023) https:\/\/doi.org\/10.1186\/s12909-023-04778-0","DOI":"10.1186\/s12909-023-04778-0"},{"key":"18_CR2","doi-asserted-by":"publisher","first-page":"87","DOI":"10.5815\/ijmecs.2024.04.07","volume":"4","author":"T Basyuk","year":"2023","unstructured":"Basyuk, T., Vasyliuk, A., Ushenko, Y., Uhryn, D., Hu, Z., Talakh, M.: Modeling and development of a computer simulator with formation of working scenarios for training operator personnel in the search for objects. Int. J. Mod. Educ. Comput. Sci. 4, 87\u2013112 (2023). https:\/\/doi.org\/10.5815\/ijmecs.2024.04.07","journal-title":"Int. J. Mod. Educ. Comput. Sci."},{"issue":"2","key":"18_CR3","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1037\/0021-9010.93.2.296","volume":"93","author":"BS Bell","year":"2008","unstructured":"Bell, B.S., Kozlowski, S.W.J.: Active learning: effects of core training design elements on self-regulatory processes, learning, and adaptability. J. Appl. Psychol. 93(2), 296\u2013316 (2008). https:\/\/doi.org\/10.1037\/0021-9010.93.2.296","journal-title":"J. Appl. Psychol."},{"key":"18_CR4","doi-asserted-by":"publisher","unstructured":"Bell, A.J., Rogers, M.B., Pearce, J.M.: The insider threat: behavioral indicators and factors influencing likelihood of intervention. Int. J. Crit. Infrastruct. Protect. 24, 166\u2013176 (2019) https:\/\/doi.org\/10.1016\/j.ijcip.2018.12.001","DOI":"10.1016\/j.ijcip.2018.12.001"},{"key":"18_CR5","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.ecns.2022.03.009","volume":"71","author":"NP Blodgett","year":"2022","unstructured":"Blodgett, N.P., Howard, V.M., Phillips, B.C., Andolsek, K., Molloy, M.A.: Developing virtual simulations to confront cacism and bias in health professions education. Clin. Simul. Nurs. 71, 105\u2013111 (2022). https:\/\/doi.org\/10.1016\/j.ecns.2022.03.009","journal-title":"Clin. Simul. Nurs."},{"key":"18_CR6","volume-title":"The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud)","author":"D Cappelli","year":"2012","unstructured":"Cappelli, D., Moore, A., Treciak, R.: The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud). Pearson Education Inc., Massachusetts (2012)"},{"issue":"184","key":"18_CR7","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1002\/ace.20546","volume":"2024","author":"R Clair","year":"2024","unstructured":"Clair, R.: Andragogy: past and present potential. New Direct. Adult Contin. Educ. 2024(184), 7\u201313 (2024). https:\/\/doi.org\/10.1002\/ace.20546","journal-title":"New Direct. Adult Contin. Educ."},{"key":"18_CR8","doi-asserted-by":"publisher","first-page":"e7","DOI":"10.1016\/j.ecns.2009.07.003","volume":"6","author":"TC Clapper","year":"2010","unstructured":"Clapper, T.C.: Beyond Knowles: what those conducting simulation need to know about adult learning theory. Clin. Simul. Nurs. 6, e7-14 (2010). https:\/\/doi.org\/10.1016\/j.ecns.2009.07.003","journal-title":"Clin. Simul. Nurs."},{"key":"18_CR9","doi-asserted-by":"publisher","unstructured":"Dunphy, P., et al.: Understanding the experience-centeredness of privacy and security technologies. In: NSPW\u201914: Proceedings of the 2014 New Security Paradigms Workshop, pp. 83\u201394. ACM, New York (2014) https:\/\/doi.org\/10.1145\/2683467.2683475","DOI":"10.1145\/2683467.2683475"},{"issue":"6","key":"18_CR10","doi-asserted-by":"publisher","first-page":"73","DOI":"10.5430\/jnep.v5n6p73","volume":"5","author":"GL Gillespie","year":"2015","unstructured":"Gillespie, G.L., Brown, K., Grubb, P., Shay, A., Montoya, K.: Qualitative evaluation of a role play bullying simulation. J. Nurs. Educ. Pract. 5(6), 73\u201380 (2015). https:\/\/doi.org\/10.5430\/jnep.v5n6p73","journal-title":"J. Nurs. Educ. Pract."},{"key":"18_CR11","doi-asserted-by":"publisher","unstructured":"Greene, K., Larsen, L.: Virtual andragogy: a new paradigm for serving adult online learners. Int. J. Digital Soc. (IJDS) 9(2), 1376\u20131381 (2018) https:\/\/doi.org\/10.20533\/ijds.2040.2570.2018.0169","DOI":"10.20533\/ijds.2040.2570.2018.0169"},{"key":"18_CR12","doi-asserted-by":"publisher","unstructured":"Greitzer, F.L., Moore, A.P., Cappelli, D.M., Andrews, D.H., Carroll, L.A., Hull, T.D.: Combating the insider cyber threat. IEEE Secur. Priv. 6(1), 61\u201364 (2008). https:\/\/doi.org\/10.1109\/MSP.2008.8","DOI":"10.1109\/MSP.2008.8"},{"issue":"2","key":"18_CR13","doi-asserted-by":"publisher","first-page":"756","DOI":"10.3390\/su17020756","volume":"17","author":"D Gudoniene","year":"2025","unstructured":"Gudoniene, D., et al.: Hybrid teaching and learning in higher education: a systematic literature review. Sustainability 17(2), 756 (2025). https:\/\/doi.org\/10.3390\/su17020756","journal-title":"Sustainability"},{"key":"18_CR14","doi-asserted-by":"publisher","unstructured":"Gum, L., Greenhill J., Dix, K.: Clinical simulation in maternity (CSiM): interprofessional learning through simulation team training. Qual. Saf. Health Care 19(5), e19, 1\u20135 (2010). https:\/\/doi.org\/10.1136\/qshc.2008.030767","DOI":"10.1136\/qshc.2008.030767"},{"key":"18_CR15","doi-asserted-by":"publisher","unstructured":"Hight, M.P., Fussell, S.G., Kurkchubasche, M.A., Hummell, I.J.: Effectiveness of virtual reality simulations for civilian, ab initio pilot training. J. Aviat.\/Aeros. Educ. Res. 31(1), 1\u201317 (2022) https:\/\/doi.org\/10.15394\/jaaer.2022.1903","DOI":"10.15394\/jaaer.2022.1903"},{"key":"18_CR16","doi-asserted-by":"publisher","unstructured":"Kavak, H., Padilla, J.J., Vernon-Bido, D., Diallo, S.Y., Gore, R., Shetty, S.: Simulation for cybersecurity: state of the art and future directions. J. Cybersecur., 1\u201313 (2021) https:\/\/doi.org\/10.1093\/cybsec\/tyab005","DOI":"10.1093\/cybsec\/tyab005"},{"issue":"2","key":"18_CR17","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1177\/1046878120962152","volume":"52","author":"O Kelleci","year":"2020","unstructured":"Kelleci, O., Aksoy, N.C.: Using game-based virtual classroom simulation in teacher training: user experience research. Simul. Gaming 52(2), 204\u2013225 (2020). https:\/\/doi.org\/10.1177\/1046878120962152","journal-title":"Simul. Gaming"},{"key":"18_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102267","volume":"106","author":"K Khando","year":"2021","unstructured":"Khando, K., Gao, S., Islam, S.M., Salman, A.: Enhancing employees information security awareness in private and public organisations: a systematic literature review. Comput. Secur. 106, 102267 (2021). https:\/\/doi.org\/10.1016\/j.cose.2021.102267","journal-title":"Comput. Secur."},{"issue":"3","key":"18_CR19","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1177\/009155217800500302","volume":"5","author":"MS Knowles","year":"1978","unstructured":"Knowles, M.S.: Andragogy: adult learning theory in perspective. Community Coll. Rev. 5(3), 9\u201320 (1978). https:\/\/doi.org\/10.1177\/009155217800500302","journal-title":"Community Coll. Rev."},{"key":"18_CR21","doi-asserted-by":"publisher","unstructured":"Liu, L. De Vel, O., Han, Q-L., Xiang, Y.: Detecting and preventing cyber insider threats: a survey. IEEE Commun. Surv. Tutor. 20(2), 1397\u20131417 (2018). https:\/\/doi.org\/10.1109\/COMST.2018.2800740","DOI":"10.1109\/COMST.2018.2800740"},{"key":"18_CR22","first-page":"1","volume-title":"Contemporary Theories of Learning","author":"J Mezirow","year":"2018","unstructured":"Mezirow, J.: Transformative Learning Theory. In: Illerus, K. (ed.) Contemporary Theories of Learning, pp. 1\u201315. Routledge, London (2018)"},{"key":"18_CR23","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1016\/j.nedt.2010.03.005","volume":"30","author":"CS McCaughey","year":"2010","unstructured":"McCaughey, C.S., Traynor, M.K.: The role of simulation in nurse education. Nurse Educ. Today 30, 827\u2013832 (2010). https:\/\/doi.org\/10.1016\/j.nedt.2010.03.005","journal-title":"Nurse Educ. Today"},{"key":"18_CR24","unstructured":"McGrath, V.: Reviewing the evidence on how adult students learn: an examination of Knowles\u2019 andragogy model. Irish J. Adult Commun. Educ., 99\u2013110 (2009) https:\/\/eric.ed.gov\/?id=EJ860562. Accessed 28 Jan 2025"},{"key":"18_CR25","unstructured":"Nelson, L.C., Beneda, J.G., McGrath, S.M., Youpa, D.G.: Enhancing supervisor reporting of behaviors of concern. PERSEREC, OPA Report No., pp. 2019\u2013033 (2019) https:\/\/apps.dtic.mil\/sti\/pdfs\/AD1075281.pdf. Accessed 28 Jan 2025"},{"key":"18_CR26","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/978-3-319-07620-1_24","volume-title":"Human Aspects of Information Security, Privacy, and Trust: Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings","author":"JRC Nurse","year":"2014","unstructured":"Nurse, J.R.C., et al.: A critical reflection on the threat from human insiders \u2013 its nature, industry perceptions, and detection approaches. In: Tryfonas, T., Askoxylakis, I. (eds.) Human Aspects of Information Security, Privacy, and Trust: Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings, pp. 270\u2013281. Springer International Publishing, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-07620-1_24"},{"key":"18_CR27","doi-asserted-by":"publisher","unstructured":"Prebot, B., Du, Y., Gonzalez, C.: Learning about simulated adversaries from human defenders using interactive cyber-defense games. J. Cybersecur. 9(1), tyad022 (2023) https:\/\/doi.org\/10.1093\/cybsec\/tyad022","DOI":"10.1093\/cybsec\/tyad022"},{"issue":"3","key":"18_CR28","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.istr.2010.11.002","volume":"15","author":"KR Sarkar","year":"2010","unstructured":"Sarkar, K.R.: Assessing insider threats to information security using technical, behavioural and organisational measures. Inf. Secur. Tech. Rep. 15(3), 112\u2013133 (2010). https:\/\/doi.org\/10.1016\/j.istr.2010.11.002","journal-title":"Inf. Secur. Tech. Rep."},{"key":"18_CR29","unstructured":"Sang, C.: Applications of andragogy in multidisciplinary teaching and learning. J. Adult Educ. 39(2), 25\u201335 (2010). https:\/\/files.eric.ed.gov\/fulltext\/EJ930244.pdf. Accessed 28 Jan 2025"},{"key":"18_CR30","doi-asserted-by":"publisher","first-page":"2911","DOI":"10.1007\/s11948-020-00250-0","volume":"26","author":"K Shilton","year":"2022","unstructured":"Shilton, K., Heidenblad, D., Porter, A., Winter, S., Kendig, M.: Role-playing computer ethics: designing and evaluating the privacy by design (PbD) Simulation. Sci. Eng. Ethics 26, 2911\u20132926 (2022). https:\/\/doi.org\/10.1007\/s11948-020-00250-0","journal-title":"Sci. Eng. Ethics"},{"key":"18_CR31","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-031-43129-6_17","volume-title":"Social, Cultural, and Behavioral Modeling: 16th International Conference, SBP-BRiMS 2023, Pittsburgh, PA, USA, September 20\u201322, 2023, Proceedings","author":"J Shin","year":"2023","unstructured":"Shin, J., Carley, K.M., Richard Carley, L.: Integrating human factors into agent-based simulation for\u00a0dynamic phishing susceptibility. In: Thomson, R., Al-khateeb, S., Burger, A., Park, P., Pyke, A.A. (eds.) Social, Cultural, and Behavioral Modeling: 16th International Conference, SBP-BRiMS 2023, Pittsburgh, PA, USA, September 20\u201322, 2023, Proceedings, pp. 169\u2013178. Springer Nature Switzerland, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-43129-6_17"},{"issue":"1","key":"18_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0000039","volume":"1","author":"M Slater","year":"2006","unstructured":"Slater, M., et al.: A virtual reprise of the Stanley Milgram obedience experiments. PLoS ONE 1(1), 1 (2006). https:\/\/doi.org\/10.1371\/journal.pone.0000039","journal-title":"PLoS ONE"},{"key":"18_CR33","doi-asserted-by":"publisher","unstructured":"Soilis, N., Bhanji, F., Kinsella, E.A.: Virtual reality simulation for facilitating critical reflection and transformative learning: pedagogical, practical, and ethical considerations. Adv. Simul. 9, 49 (2024). https:\/\/doi.org\/10.1186\/s41077-024-00319-x","DOI":"10.1186\/s41077-024-00319-x"},{"key":"18_CR34","doi-asserted-by":"publisher","unstructured":"Sonja, P., Knauss-Forrester, C., Alsaker, F.D.: Self and other oriented social skills: differential associations with children\u2019s mental health and bullying roles. J. Educ. Res. Online 4(1), 99\u2013123 (2012). https:\/\/doi.org\/10.25656\/01:7053","DOI":"10.25656\/01:7053"},{"key":"18_CR35","doi-asserted-by":"publisher","unstructured":"Stancil, S.: So, do reusable assignments really benefit students? J. Open Educ. Res. High. Educ. 3(1), 62\u201379 (2025). https:\/\/doi.org\/10.31274\/joerhe.17911","DOI":"10.31274\/joerhe.17911"},{"issue":"4","key":"18_CR36","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1037\/lhb0000032","volume":"37","author":"PJ Taylor","year":"2013","unstructured":"Taylor, P.J., et al.: Detecting insider threats through language change. Law Hum Behav. 37(4), 267\u2013275 (2013). https:\/\/doi.org\/10.1037\/lhb0000032","journal-title":"Law Hum Behav."},{"issue":"5","key":"18_CR37","doi-asserted-by":"publisher","first-page":"911","DOI":"10.1017\/jmo.2018.57","volume":"27","author":"MT Whitty","year":"2021","unstructured":"Whitty, M.T.: Developing a conceptual model for insider threat. J. Manag. Organ. 27(5), 911\u2013929 (2021). https:\/\/doi.org\/10.1017\/jmo.2018.57","journal-title":"J. Manag. Organ."},{"key":"18_CR38","doi-asserted-by":"publisher","unstructured":"Whitty, M.T., Mostafa, N., Grobler, M.: Cybersecurity when working from home during COVID-19: considering the human factors. J. Cybersecur. 10(1), tyae001 (2024a). https:\/\/doi.org\/10.1093\/cybsec\/tyae001","DOI":"10.1093\/cybsec\/tyae001"},{"issue":"4","key":"18_CR39","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1108\/ICS-11-2023-0210","volume":"32","author":"MT Whitty","year":"2024","unstructured":"Whitty, M.T., Ruddy, C., Keatley, D., Butavicius, M., Grobler, M.: The prince of insiders: a multiple pathway approach to understanding IP theft insider attacks. Inf. Comput. Secur. 32(4), 509\u2013522 (2024b). https:\/\/doi.org\/10.1108\/ICS-11-2023-0210","journal-title":"Inf. Comput. Secur."},{"key":"18_CR40","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1007\/978-3-031-38530-8_30","volume-title":"Human Aspects of Information Security and Assurance: 17th IFIP WG 11.12 International Symposium, HAISA 2023, Kent, UK, July 4\u20136, 2023, Proceedings","author":"MT Whitty","year":"2023","unstructured":"Whitty, M.T., Ruddy, C., Keatley, D.A.: To catch a thief: examining socio-technical variables and developing a pathway framework for IP theft insider attacks. In: Furnell, S., Clarke, N. (eds.) Human Aspects of Information Security and Assurance: 17th IFIP WG 11.12 International Symposium, HAISA 2023, Kent, UK, July 4\u20136, 2023, Proceedings, pp. 377\u2013390. Springer Nature Switzerland, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-38530-8_30"},{"key":"18_CR41","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1016\/j.chb.2010.08.004","volume":"27","author":"MT Whitty","year":"2011","unstructured":"Whitty, M.T., Young, G., Goodings, L.: What I won\u2019t do in pixels: examining the limits of taboo violation on MMORPGs. Comput. Hum. Behav. 27, 268\u2013275 (2011). https:\/\/doi.org\/10.1016\/j.chb.2010.08.004","journal-title":"Comput. Hum. Behav."},{"issue":"1","key":"18_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/09515080903532274","volume":"23","author":"G Young","year":"2010","unstructured":"Young, G.: Virtually real emotions and the paradox of fiction: Implications for the use of virtual environments in psychological research. Philos. Psychol. 23(1), 1\u201321 (2010). https:\/\/doi.org\/10.1080\/09515080903532274","journal-title":"Philos. Psychol."},{"key":"18_CR43","doi-asserted-by":"publisher","unstructured":"Young, G., Whitty, M.: Transcending Taboos: A Moral and Psychological Examination of Cyberspace. Routledge, London (2012) https:\/\/doi.org\/10.4324\/9780203126769","DOI":"10.4324\/9780203126769"},{"issue":"6","key":"18_CR44","doi-asserted-by":"publisher","first-page":"1228","DOI":"10.1016\/j.chb.2010.03.023","volume":"26","author":"G Young","year":"2010","unstructured":"Young, G., Whitty, M.T.: Games without frontiers: on the moral and psychological implications of violating taboos withing multi-player virtual spaces. Comput. Hum. Behav. 26(6), 1228\u20131236 (2010). https:\/\/doi.org\/10.1016\/j.chb.2010.03.023","journal-title":"Comput. Hum. Behav."}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-92833-8_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T17:22:21Z","timestamp":1760635341000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-92833-8_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031928321","9783031928338"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-92833-8_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"11 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gothenburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2025.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}