{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:58:39Z","timestamp":1757620719867,"version":"3.44.0"},"publisher-location":"Cham","reference-count":62,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031971143"},{"type":"electronic","value":"9783031971150"}],"license":[{"start":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T00:00:00Z","timestamp":1754092800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T00:00:00Z","timestamp":1754092800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-031-97115-0_5","type":"book-chapter","created":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T06:02:23Z","timestamp":1754028143000},"page":"66-81","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Modeling the\u00a0Case of\u00a0Cyber Espionage for\u00a0Executive Game Simulations"],"prefix":"10.1007","author":[{"given":"Jennifer-Marieclaire","family":"Sturlese","sequence":"first","affiliation":[]},{"given":"Ronald","family":"Hochreiter","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,2]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Schmitz-Berndt, S.: Defining the reporting threshold for a cybersecurity incident under the nis directive and the nis 2 directive. J. Cybersecur. 9(1), tyad009 (2023)","DOI":"10.1093\/cybsec\/tyad009"},{"key":"5_CR2","unstructured":"Doran, G.T.: There\u2019s a smart way to write managements\u2019s goals and objectives. Manage. Rev.70(11) (1981)"},{"key":"5_CR3","unstructured":"Burrell, D.N., Aridi, A.S., Nobles, C.: The critical need for formal leadership development programs for cybersecurity and information technology professionals. In: International Conference on Cyber Warfare and Security, pp. 82\u201391. Academic Conferences International Limited (2018)"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Malone, M., Wang, Y., James, K., Anderegg, M., Werner, J., Monrose, F.: To gamify or not? on leaderboard effects, student engagement and learning outcomes in a cybersecurity intervention. In: Proceedings of the 52nd ACM Technical Symposium on Computer Science Education, pp. 1135\u20131141 (2021)","DOI":"10.1145\/3408877.3432544"},{"key":"5_CR5","doi-asserted-by":"publisher","first-page":"112487","DOI":"10.1109\/ACCESS.2022.3216711","volume":"10","author":"TD Ashley","year":"2022","unstructured":"Ashley, T.D., Kwon, R., Gourisetti, S.N.G., Katsis, C., Bonebrake, C.A., Boyd, P.A.: Gamification of cybersecurity for workforce development in critical infrastructure. IEEE Access 10, 112487\u2013112501 (2022)","journal-title":"IEEE Access"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Jelo, M., Helebrandt, P.: Gamification of cyber ranges in cybersecurity education. In: 2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA), pp. 280\u2013285. IEEE (2022)","DOI":"10.1109\/ICETA57911.2022.9974714"},{"issue":"9","key":"5_CR7","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1089\/cyber.2020.0526","volume":"24","author":"T van Steen","year":"2021","unstructured":"van Steen, T., Deeleman, J.: Successful gamification of cybersecurity training. Cyberpsychol. Behav. Soc. Netw. 24(9), 593\u2013598 (2021)","journal-title":"Cyberpsychol. Behav. Soc. Netw."},{"issue":"2","key":"5_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3057268","volume":"50","author":"CT Do","year":"2017","unstructured":"Do, C.T., et al.: Game theory for cyber security and privacy. ACM Comput. Surv. (CSUR) 50(2), 1\u201337 (2017)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"1","key":"5_CR9","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1109\/SURV.2012.062612.00056","volume":"15","author":"X Liang","year":"2012","unstructured":"Liang, X., Xiao, Y.: Game theory for network security. IEEE Commun. Surv. Tutor. 15(1), 472\u2013486 (2012)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Korzhyk, D., Yin, Z., Kiekintveld, C., Conitzer, V., Tambe, M.: Stackelberg vs. nash in security games: an extended investigation of interchangeability, equivalence, and uniqueness. J. Artif. Intell. Res. 41, 297\u2013327 (2011)","DOI":"10.1613\/jair.3269"},{"issue":"1","key":"5_CR11","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MIS.2017.11","volume":"32","author":"J Lou","year":"2017","unstructured":"Lou, J., Smith, A.M., Yevgeniy, V.: Multidefender security games. IEEE Intell. Syst. 32(1), 50\u201360 (2017)","journal-title":"IEEE Intell. Syst."},{"key":"5_CR12","unstructured":"Paruchuri, P., Pearce, J.P., Marecki, J., Tambe, M., Ordonez, F., Kraus, S.: Playing games for security: an efficient exact algorithm for solving bayesian stackelberg games. In: Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems-vol. 2, pp. 895\u2013902 (2008)"},{"issue":"3","key":"5_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2480741.2480742","volume":"45","author":"MH Manshaei","year":"2013","unstructured":"Manshaei, M.H., Zhu, Q., Alpcan, T., Bac\u015far, T., Hubaux, J.P.: Game theory meets network security and privacy. ACM Comput. Sur. (CSUR) 45(3), 1\u201339 (2013)","journal-title":"ACM Comput. Sur. (CSUR)"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Samtani, S., Abate, M., Benjamin, V., Li, W.: Cybersecurity as an industry: a cyber threat intelligence perspective. The Palgrave Handbook of International Cybercrime and Cyberdeviance, pp. 135\u2013154 (2020)","DOI":"10.1007\/978-3-319-78440-3_8"},{"issue":"2","key":"5_CR15","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1108\/ICS-09-2018-0110","volume":"27","author":"N Serketzis","year":"2019","unstructured":"Serketzis, N., Katos, V., Ilioudis, C., Baltatzis, D., Pangalos, G.J.: Actionable threat intelligence for digital forensics readiness. Inf. Comput. Secur. 27(2), 273\u2013291 (2019)","journal-title":"Inf. Comput. Secur."},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Merah, Y., Kenaza, T.: Ontology-based cyber risk monitoring using cyber threat intelligence. In: Proceedings of the 16th International Conference on Availability, Reliability and Security, pp. 1\u20138 (2021)","DOI":"10.1145\/3465481.3470024"},{"key":"5_CR17","unstructured":"Mark Button. Economic and industrial espionage (2020)"},{"issue":"1","key":"5_CR18","first-page":"2","volume":"18","author":"S Goel","year":"2017","unstructured":"Goel, S., Williams, K., Dincelli, E.: Got phished? internet security and human vulnerability. J. Assoc. Inf. Syst. 18(1), 2 (2017)","journal-title":"J. Assoc. Inf. Syst."},{"key":"5_CR19","unstructured":"Ekelhart, A., Kiesling, E., Kurniawan, K.: An att &ck-kg for linking cybersecurity attacks to adversary tactics and techniques (2021)"},{"key":"5_CR20","unstructured":"Raffat, S.K., Siddiqui, M.S., Shaikh, Z.A., Memon, A.R.: Ontology: a scientific classification technique. Sindh Univ. Res. J. 44(2AB), 63\u201368 (2012)"},{"key":"5_CR21","unstructured":"Noy, N.F., McGuinness, D.L., et\u00a0al.: Ontology development 101: a guide to creating your first ontology (2001)"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Kwon, R., Ashley, T., Castleberry, J., Mckenzie, P., Gourisetti, S.N.G.: Cyber threat dictionary using mitre att &ck matrix and nist cybersecurity framework mapping. In: 2020 Resilience Week (RWS), pp. 106\u2013112. IEEE (2020)","DOI":"10.1109\/RWS50334.2020.9241271"},{"key":"5_CR23","unstructured":"Strom, B.E., Applebaum, A., Miller, D.P., Nickels, K.C., Pennington, A.G., Thomas, C.B.: Mitre att &ck: Design and philosophy. In: Technical report. The MITRE Corporation (2018)"},{"key":"5_CR24","volume-title":"Framework for improving critical infrastructure cybersecurity","author":"National Institute of Standards and Technology","year":"2018","unstructured":"National Institute of Standards and Technology: Framework for improving critical infrastructure cybersecurity. Technical report, NIST (2018)"},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Teodoro, N., Gon\u00e7alves, L., Serr\u00e3o, C.: Nist cybersecurity framework compliance: a generic model for dynamic assessment and predictive requirements. In: 2015 IEEE Trustcom\/BigDataSE\/ISPA vol. 1, pp. 418\u2013425. IEEE (2015)","DOI":"10.1109\/Trustcom.2015.402"},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"PF M\u00f6ller, D.: Nist cybersecurity framework and mitre cybersecurity criteria. In: Guide to Cybersecurity in Digital Transformation: Trends, Methods, Technologies, Applications and Best Practices, pp. 231\u2013271. Springer (2023)","DOI":"10.1007\/978-3-031-26845-8_5"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Alshar\u2019e, M.: Cyber security framework selection: comparision of nist and iso27001. Appl. Comput. J. 245\u2013255 (2023)","DOI":"10.52098\/acj.202364"},{"key":"5_CR28","doi-asserted-by":"crossref","unstructured":"Mylrea, M., Gourisetti, S.N.G., Nicholls, A.: An introduction to buildings cybersecurity framework. In: 2017 IEEE Symposium Series on Computational Intelligence (SSCI), pp. 1\u20137. IEEE (2017)","DOI":"10.1109\/SSCI.2017.8285228"},{"key":"5_CR29","doi-asserted-by":"crossref","unstructured":"Saritac, U., Liu, X., Wang, R.: Assessment of cybersecurity framework in critical infrastructures. In: 2022 IEEE Delhi Section Conference (DELCON), pp. 1\u20134. IEEE (2022)","DOI":"10.1109\/DELCON54057.2022.9753250"},{"key":"5_CR30","doi-asserted-by":"crossref","unstructured":"Miller, S.: Espionage: ends and means. In: The Ethics of National Security Intelligence Institutions, pp. 89\u2013104. Routledge (2024)","DOI":"10.4324\/9781003106449-7"},{"key":"5_CR31","unstructured":"Bottom, N.R., RJ Gallati, R.: Industrial espionage: Intelligence techniques and countermeasures. Butterworth Oxford (1984)"},{"key":"5_CR32","doi-asserted-by":"crossref","unstructured":"Locke, E.A., Shaw, K.N., Saari, L.M., Latham, G.P.: Goal setting and task performance: 1969\u20131980. Psychol. Bull. 90(1), 125 (1981)","DOI":"10.1037\/\/0033-2909.90.1.125"},{"key":"5_CR33","doi-asserted-by":"crossref","unstructured":"RC Nurse, J., et al.: Understanding insider threat: a framework for characterising attacks. In: 2014 IEEE Security and Privacy Workshops, pp. 214\u2013228. IEEE (2014)","DOI":"10.1109\/SPW.2014.38"},{"key":"5_CR34","doi-asserted-by":"crossref","unstructured":"Gheyas, I.A., Abdallah, A.E.: Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysis. Big Data Anal. 1(1), 6 (2016)","DOI":"10.1186\/s41044-016-0006-0"},{"issue":"6","key":"5_CR35","first-page":"548","volume":"30","author":"Ms Snigdha Bishwal and Ms Sivashrita Bharadwaj","year":"2024","unstructured":"Ms Snigdha Bishwal and Ms Sivashrita Bharadwaj: Stealing the edge: how corporate espionage threatens india\u2019s growth. Educ. Administr. Theory Pract. 30(6), 548\u2013552 (2024)","journal-title":"Educ. Administr. Theory Pract."},{"key":"5_CR36","doi-asserted-by":"crossref","unstructured":"Rivera, R., Pazmi\u00f1o, L., Becerra, F., Barriga, J.: An analysis of cyber espionage process. In: Developments and Advances in Defense and Security: Proceedings of MICRADS 2021, pp. 3\u201314. Springer (2022)","DOI":"10.1007\/978-981-16-4884-7_1"},{"key":"5_CR37","first-page":"353","volume":"18","author":"D Pun","year":"2017","unstructured":"Pun, D.: Rethinking espionage in the modern era. Chi. J. Int\u2019l L. 18, 353 (2017)","journal-title":"Chi. J. Int\u2019l L."},{"issue":"1","key":"5_CR38","volume":"5","author":"A Chawla","year":"2023","unstructured":"Chawla, A.: Cyber-terrorism a wicked problem. J. Criminol. Forensic Stud. 5(1), 180058 (2023)","journal-title":"J. Criminol. Forensic Stud."},{"issue":"3","key":"5_CR39","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1177\/0047117820948247","volume":"34","author":"M Carr","year":"2020","unstructured":"Carr, M., Lesniewska, F.: Internet of things, cybersecurity and governing wicked problems: learning from climate change governance. Int. Relations 34(3), 391\u2013412 (2020)","journal-title":"Int. Relations"},{"key":"5_CR40","doi-asserted-by":"crossref","unstructured":"F Malone, E., J Malone, M.: The \u201cwicked problem\u201d of cybersecurity policy: analysis of united states and canadian policy response. Canadian Foreign Policy J. 19(2), 158\u2013177 (2013)","DOI":"10.1080\/11926422.2013.805152"},{"key":"5_CR41","unstructured":"A Sipper, J.: Hypergaming for cyber: strategy for gaming a wicked problem. Military Cyber Affairs 5(1), 5 (2022)"},{"key":"5_CR42","doi-asserted-by":"crossref","unstructured":"Alkhadra, R., Abuzaid, J., AlShammari, M., Mohammad, N.: Solar winds hack: in-depth analysis and countermeasures. In: 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT), pp. 1\u20137. IEEE (2021)","DOI":"10.1109\/ICCCNT51525.2021.9579611"},{"key":"5_CR43","doi-asserted-by":"crossref","unstructured":"Mart\u00ednez, J., M Dur\u00e1n, J.: Software supply chain attacks, a threat to global cybersecurity: solarwinds\u2019 case study. Int. J. Safety Secur. Eng. 11(5), 537\u2013545 (2021)","DOI":"10.18280\/ijsse.110505"},{"key":"5_CR44","doi-asserted-by":"crossref","unstructured":"Huddleston, J., Ji, P., Bhunia, S., Cogan, J.: How vmware exploits contributed to solarwinds supply-chain attack. In: 2021 International Conference on Computational Science and Computational Intelligence (CSCI), pp. 760\u2013765. IEEE (2021)","DOI":"10.1109\/CSCI54926.2021.00190"},{"key":"5_CR45","doi-asserted-by":"crossref","unstructured":"Sterle, L., Bhunia, S.: On solarwinds orion platform security breach. In: 2021 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Internet of People and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/IOP\/SCI), pp. 636\u2013641. IEEE (2021)","DOI":"10.1109\/SWC50871.2021.00094"},{"key":"5_CR46","doi-asserted-by":"crossref","unstructured":"Akhtar, N., Aziz, O., Hussain, T.: Latest trends in the cybersecurity after the solar wind hacking attack. Foundation University Journal of Engineering and Applied Sciences (HEC Recognized Y Category, ISSN 2706-7351), 1(2), 14\u201324 (2020)","DOI":"10.33897\/fujeas.v1i2.347"},{"issue":"8","key":"5_CR47","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S1353-4858(15)30068-4","volume":"2015","author":"V Smyth","year":"2015","unstructured":"Smyth, V.: Cyber-security fortresses built on quicksand. Netw. Secur. 2015(8), 5\u20138 (2015)","journal-title":"Netw. Secur."},{"key":"5_CR48","unstructured":"Koch, D.D., et\u00a0al. Is the hipaa security rule enough to protect electronic personal health information (phi) in the cyber age? J. Health Care Finance 43(3) (2016)"},{"key":"5_CR49","doi-asserted-by":"crossref","unstructured":"Floyd, T., Grieco, M., Reid, E.F.: Mining hospital data breach records: cyber threats to us hospitals. In: 2016 IEEE Conference on Intelligence and Security Informatics (ISI), pp. 43\u201348. IEEE (2016)","DOI":"10.1109\/ISI.2016.7745441"},{"key":"5_CR50","doi-asserted-by":"crossref","unstructured":"Dmytrenko, S.: Espionage counteraction as national security paradigm of 21st century. 3C, 34(1), 57","DOI":"10.46493\/2663-2675.34(1).2024.57"},{"issue":"2","key":"5_CR51","first-page":"385","volume":"8","author":"Ovidiu Horia Maican","year":"2019","unstructured":"Ovidiu Horia Maican: Legal aspects of economic espionage. Perspect. Law Pub. Administr. 8(2), 385\u2013392 (2019)","journal-title":"Perspect. Law Pub. Administr."},{"key":"5_CR52","doi-asserted-by":"crossref","unstructured":"R Early, B., Gartzke, E.: Spying from space: reconnaissance satellites and interstate disputes. J. Conflict Resol. 65(9), 1551\u20131575 (2021)","DOI":"10.1177\/0022002721995894"},{"issue":"1","key":"5_CR53","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1057\/s41284-019-00194-6","volume":"33","author":"Z Bederna","year":"2020","unstructured":"Bederna, Z., Szadeczky, T.: Cyber espionage through botnets. Secur. J. 33(1), 43\u201362 (2020)","journal-title":"Secur. J."},{"issue":"5","key":"5_CR54","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1080\/01900692.2019.1680689","volume":"43","author":"T Eldem","year":"2020","unstructured":"Eldem, T.: The governance of turkey\u2019s cyberspace: between cyber security and information security. Int. J. Public Adm. 43(5), 452\u2013465 (2020)","journal-title":"Int. J. Public Adm."},{"key":"5_CR55","doi-asserted-by":"crossref","unstructured":"N Schmitt, M.: Tallinn manual 2.0 on the international law applicable to cyber operations. Cambridge University Press (2017)","DOI":"10.1017\/9781316822524"},{"key":"5_CR56","unstructured":"Booch, G.: The unified modeling language user guide. Pearson Education India (2005)"},{"key":"5_CR57","unstructured":"Rumbaugh, J.: The unified modeling language reference manual. Pearson Education India (2005)"},{"key":"5_CR58","doi-asserted-by":"crossref","unstructured":"Bauer, B., Odell, J.: Uml 2.0 and agents: how to build agent-based systems with the new uml standard. Eng. Appl. Artif.l intell. 18(2), 141\u2013157 (2005)","DOI":"10.1016\/j.engappai.2004.11.016"},{"key":"5_CR59","doi-asserted-by":"crossref","unstructured":"Guedes, G.T.A., Vicari, R.M.: Applying auml and uml 2 in the multi-agent systems project. In: Advances in Conceptual Modeling-Challenging Perspectives: ER 2009 Workshops CoMoL, ETheCoM, FP-UML, MOST-ONISW, QoIS, RIGiM, SeCoGIS, Gramado, Brazil, November 9-12, 2009. Proceedings 28, pages 106\u2013115. Springer (2009)","DOI":"10.1007\/978-3-642-04947-7_14"},{"issue":"8","key":"5_CR60","first-page":"1490","volume":"1","author":"KS Babu","year":"2013","unstructured":"Babu, K.S., Maruthi, R.: Lifecycle for game development to ensure enhanced productivity. Int. J. Innov. Res. Comput. Commun. Eng. 1(8), 1490\u20131503 (2013)","journal-title":"Int. J. Innov. Res. Comput. Commun. Eng."},{"issue":"1","key":"5_CR61","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/TG.2019.2947597","volume":"13","author":"S Ariyurek","year":"2019","unstructured":"Ariyurek, S., Betin-Can, A., Surer, E.: Automated video game testing using synthetic and humanlike agents. IEEE Trans. Games 13(1), 50\u201367 (2019)","journal-title":"IEEE Trans. Games"},{"key":"5_CR62","doi-asserted-by":"crossref","unstructured":"Ariyurek, S., Betin-Can, A., Surer, E.: Enhancing the monte carlo tree search algorithm for video game testing. In: 2020 IEEE Conference on Games (CoG), pp. 25\u201332. IEEE (2020)","DOI":"10.1109\/CoG47356.2020.9231670"}],"container-title":["IFIP Advances in Information and Communication Technology","Information Technology in Disaster Risk Reduction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-97115-0_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T10:38:09Z","timestamp":1757327889000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-97115-0_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,2]]},"ISBN":["9783031971143","9783031971150"],"references-count":62,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-97115-0_5","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2025,8,2]]},"assertion":[{"value":"2 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ITDRR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Technology in Disaster Risk Reduction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Krems an der Donau","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"itdrr2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/itdrr.org\/conference\/itdrr2024","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}