{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T19:59:47Z","timestamp":1777492787351,"version":"3.51.4"},"publisher-location":"Cham","reference-count":50,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319569246","type":"print"},{"value":"9783319569253","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-56925-3_2","type":"book-chapter","created":{"date-parts":[[2017,4,5]],"date-time":"2017-04-05T12:33:44Z","timestamp":1491395624000},"page":"12-23","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":231,"title":["Blockchain Technology as an Enabler of Service Systems: A Structured Literature Review"],"prefix":"10.1007","author":[{"given":"Stefan","family":"Seebacher","sequence":"first","affiliation":[]},{"given":"Ronny","family":"Sch\u00fcritz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,6]]},"reference":[{"key":"2_CR1","unstructured":"Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008)"},{"key":"2_CR2","unstructured":"Swan, M.: Blockchain: Blueprint for a New Economy. O\u2019Reilly Media, Inc., Sebastopol (2015)"},{"key":"2_CR3","volume-title":"Blockchain Revolution","author":"D Tapscott","year":"2016","unstructured":"Tapscott, D., Tapscott, A.: Blockchain Revolution. Penguine Random House, New York (2016)"},{"key":"2_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-319-44421-5_20","volume-title":"Electronic Government","author":"S \u00d8lnes","year":"2016","unstructured":"\u00d8lnes, S.: Beyond bitcoin enabling smart government using blockchain technology. In: Scholl, H.J., et al. (eds.) EGOVIS 2016. LNCS, vol. 9820, pp. 253\u2013264. Springer, Cham (2016). doi:10.1007\/978-3-319-44421-5_20"},{"key":"2_CR5","unstructured":"Nachiappan, Crosby, M., Pattanayak, P., Verma, S., Kalyanaraman, V.: BlockChain technology: beyond bitcoin. Applied Innovation Review, pp. 6\u201319 (2016). http:\/\/scet.berkeley.edu\/wp-content\/uploads\/AIR-2016-Final-version-Int.pdf. (Accessed 10 Oct 2016)"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Szabo, N.: Formalizing and securing relationships on public networks. First Monday 2\n(1997). http:\/\/pear.accc.uic.edu\/ojs\/index.php\/fm\/article\/view\/548\/469. (Accessed 10 Oct 2016)","DOI":"10.5210\/fm.v2i9.548"},{"key":"2_CR7","unstructured":"Gartner: Hype Cycle for Emerging Technologies. http:\/\/www.gartner.com\/newsroom\/id\/3412017. Accessed 21 Nov 2016"},{"key":"2_CR8","unstructured":"Greenspan, G.: Avoiding the pointless blockchain project. http:\/\/www.multichain.com\/blog\/2015\/11\/avoiding-pointless-blockchain-project\/. Accessed 13 Nov 2016"},{"key":"2_CR9","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1257\/jep.29.2.213","volume":"29","author":"R B\u00f6hme","year":"2015","unstructured":"B\u00f6hme, R., Christin, N., Edelman, B., Moore, T.: Bitcoin: economics, technology, and governance. J. Econ. Perspect. 29, 213\u2013238 (2015)","journal-title":"J. Econ. Perspect."},{"key":"2_CR10","unstructured":"Warburg, B.: How the blockchain will radically transform the economy. https:\/\/www.ted.com\/talks\/bettina_warburg_how_the_blockchain_will_radically_transform_the_economy\/transcript?language=en. Accessed 21 Nov 2016"},{"key":"2_CR11","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/s10257-008-0105-1","volume":"7","author":"PP Maglio","year":"2009","unstructured":"Maglio, P.P., Vargo, S.L., Caswell, N., Spohrer, J., Vargo, S.L., Caswell, N., Maglio, P.P.: The service system is the basic abstraction of service science. Inf. Syst. E-bus. Manag. 7, 395\u2013406 (2009)","journal-title":"Inf. Syst. E-bus. Manag."},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Zhao, J.L., Fan, S., Yan, J.: Overview of business innovations and research opportunities in blockchain and introduction to the special issue. Financ. Innov. 2, 28 (2016)","DOI":"10.1186\/s40854-016-0049-2"},{"key":"2_CR13","unstructured":"Webster, J., Watson, R.T.: Analyzing the past to prepare for the future: writing a literature review. MIS Q. 26, xiii\u2013xxiii (2002)"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1007\/978-3-662-47854-7_33","volume-title":"Financial Cryptography and Data Security","author":"Y Lewenberg","year":"2015","unstructured":"Lewenberg, Y., Sompolinsky, Y., Zohar, A.: Inclusive block chain protocols. In: B\u00f6hme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 528\u2013547. Springer, Heidelberg (2015). doi:10.1007\/978-3-662-47854-7_33"},{"key":"2_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-3-662-46803-6_10","volume-title":"Advances in Cryptology - EUROCRYPT 2015","author":"J Garay","year":"2015","unstructured":"Garay, J., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol: analysis and applications. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9057, pp. 281\u2013310. Springer, Heidelberg (2015). doi:10.1007\/978-3-662-46803-6_10"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Wang, H., Chen, K., Xu, D.: A maturity model for blockchain adoption. Financ. Innov. 2, 12 (2016)","DOI":"10.1186\/s40854-016-0031-z"},{"key":"2_CR17","doi-asserted-by":"publisher","first-page":"2084","DOI":"10.1109\/COMST.2016.2535718","volume":"18","author":"F Tschorsch","year":"2016","unstructured":"Tschorsch, F., Scheuermann, B.: Bitcoin and beyond: a technical survey on decentralized digital currencies. IEEE Commun. Surv. Tutorials 18, 2084\u20132123 (2016)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Kosba, A., Miller, A., Shi, E., Wen, Z., Papamanthou, C.: Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In: 2016 IEEE Symposium on Security and Privacy, pp. 839\u2013858 (2016)","DOI":"10.1109\/SP.2016.55"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J.A., Felten, E.W.: Research perspectives and challenges for bitcoin and cryptocurrencies. In: 2015 IEEE Symposium on Security and Privacy, pp. 104\u2013121 (2015)","DOI":"10.1109\/SP.2015.14"},{"key":"2_CR20","unstructured":"Beck, R., Stenum Czepluch, J., Lollike, N., Malone, S.: Blockchain - the gateway to trust-free cryptographic transactions. In: Twenty-Fourth European Conference on Information Systems (ECIS), pp. 1\u201314 (2016)"},{"key":"2_CR21","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/s12083-015-0347-x","volume":"9","author":"D Kraft","year":"2016","unstructured":"Kraft, D.: Difficulty control for blockchain-based consensus systems. Peer-to-Peer Netw. Appl. 9, 397\u2013413 (2016)","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"2_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-3-319-40253-6_4","volume-title":"Information Security and Privacy","author":"P McCorry","year":"2016","unstructured":"McCorry, P., M\u00f6ser, M., Shahandasti, S.F., Hao, F.: Towards bitcoin payment networks. In: Liu, J.K.K., Steinfeld, R. (eds.) ACISP 2016. LNCS, vol. 9722, pp. 57\u201376. Springer, Cham (2016). doi:10.1007\/978-3-319-40253-6_4"},{"key":"2_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-319-46598-2_9","volume-title":"Security and Trust Management","author":"J Cucurull","year":"2016","unstructured":"Cucurull, J., Puiggal\u00ed, J.: Distributed immutabilization of secure logs. In: Barthe, G., Markatos, E., Samarati, P. (eds.) STM 2016. LNCS, vol. 9871, pp. 122\u2013137. Springer, Cham (2016). doi:10.1007\/978-3-319-46598-2_9"},{"key":"2_CR24","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-319-40515-5_8","volume-title":"Software Business","author":"David S Gerstl","year":"2016","unstructured":"Gerstl, David S.: Leveraging bitcoin blockchain technology to modernize security perfection under the uniform commercial code. In: Maglyas, A., Lamprecht, A.-L. (eds.) Software Business. LNBIP, vol. 240, pp. 109\u2013123. Springer, Cham (2016). doi:10.1007\/978-3-319-40515-5_8"},{"key":"2_CR25","doi-asserted-by":"publisher","first-page":"490","DOI":"10.1007\/978-3-319-45153-4_48","volume-title":"Adaptive and Adaptable Learning: 11th European Conference on Technology Enhanced Learning, EC-TEL 2016","author":"M Sharples","year":"2016","unstructured":"Sharples, M., Domingue, J.: The blockchain and kudos: a distributed system for educational record, reputation and reward. In: Verbert, K., Sharples, M., Klobu\u010dar, T. (eds.) Adaptive and Adaptable Learning: 11th European Conference on Technology Enhanced Learning, EC-TEL 2016, pp. 490\u2013496. Springer International Publishing, Cham (2016)"},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Zyskind, G., Nathan, O., Pentland, A.S.: Decentralizing privacy: using blockchain to protect personal data. In: Proceedings of 2015 IEEE Security and Privacy Workshop, SPW 2015, pp. 180\u2013184 (2015)","DOI":"10.1109\/SPW.2015.27"},{"key":"2_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-319-42019-6_11","volume-title":"Rule Technologies. Research, Tools, and Applications","author":"F Idelberger","year":"2016","unstructured":"Idelberger, F., Governatori, G., Riveret, R., Sartor, G.: Evaluation of logic-based smart contracts for blockchain systems. In: Alferes, J.J.J., Bertossi, L., Governatori, G., Fodor, P., Roman, D. (eds.) RuleML 2016. LNCS, vol. 9718, pp. 167\u2013183. Springer, Cham (2016). doi:10.1007\/978-3-319-42019-6_11"},{"key":"2_CR28","doi-asserted-by":"crossref","unstructured":"Wright, A., De Filippi, P.: Decentralized blockchain technology and the rise of lex cryptographia. SSRN Scholarly Paper ID 2580664. Social Science Research Network, Rochester, NY (2015). https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2580664. (Accessed 10 Oct 2016)","DOI":"10.2139\/ssrn.2580664"},{"key":"2_CR29","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/978-3-642-32946-3_29","volume-title":"Financial Cryptography and Data Security: 16th International Conference, FC 2012","author":"S Barber","year":"2012","unstructured":"Barber, S., Boyen, X., Shi, E., Uzun, E.: Bitter to better - how to make bitcoin a better currency. In: Keromytis, A.D. (ed.) Financial Cryptography and Data Security: 16th International Conference, FC 2012, pp. 399\u2013414. Springer, Heidelberg (2012)"},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"Cai, Y., Zhu, D.: Fraud detections for online businesses: a perspective from blockchain technology. Financ. Innov. 2, 20 (2016)","DOI":"10.1186\/s40854-016-0039-4"},{"key":"2_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-662-53357-4_6","volume-title":"Financial Cryptography and Data Security","author":"K Delmolino","year":"2016","unstructured":"Delmolino, K., Arnett, M., Kosba, A., Miller, A., Shi, E.: Step by step towards creating a safe smart contract: lessons and insights from a cryptocurrency lab. In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 79\u201394. Springer, Heidelberg (2016). doi:10.1007\/978-3-662-53357-4_6"},{"key":"2_CR32","unstructured":"Eyal, I., Gencer, A.E., Sirer, E.G., van Renesse, R.: Bitcoin-NG: a scalable blockchain protocol. In: Proceeding of 13th USENIX Symposium Networked Systems Design and Implementation (NSDI 2016), pp. 45\u201359 (2016)"},{"key":"2_CR33","doi-asserted-by":"crossref","unstructured":"Garman, C., Green, M., Miers, I.: Decentralized anonymous credentials. In: Network and Distributed System Security (NDSS) Symposium 2014, pp. 23\u201326 (2014)","DOI":"10.14722\/ndss.2014.23253"},{"key":"2_CR34","doi-asserted-by":"crossref","unstructured":"Guo, Y., Liang, C.: Blockchain application and outlook in the banking industry. Financ. Innov. 2, 24 (2016)","DOI":"10.1186\/s40854-016-0034-9"},{"key":"2_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-662-53357-4_4","volume-title":"Financial Cryptography and Data Security","author":"E Heilman","year":"2016","unstructured":"Heilman, E., Baldimtsi, F., Goldberg, S.: Blindly signed contracts: anonymous on-blockchain and off-blockchain bitcoin transactions. In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 43\u201360. Springer, Heidelberg (2016). doi:10.1007\/978-3-662-53357-4_4"},{"key":"2_CR36","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/978-3-319-45656-0_3","volume-title":"Modeling Decisions for Artificial Intelligence","author":"J Herrera-Joancomart\u00ed","year":"2016","unstructured":"Herrera-Joancomart\u00ed, J., P\u00e9rez-Sol\u00e0, C.: Privacy in bitcoin transactions: new challenges from blockchain scalability solutions. In: Torra, V., Narukawa, Y., Navarro-Arribas, G., Ya\u00f1ez, C. (eds.) MDAI 2016. LNCS (LNAI), vol. 9880, pp. 26\u201344. Springer, Cham (2016). doi:10.1007\/978-3-319-45656-0_3"},{"key":"2_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-319-46295-0_2","volume-title":"Service-Oriented Computing","author":"R Hull","year":"2016","unstructured":"Hull, R., Batra, V.S., Chen, Y.-M., Deutsch, A., Heath III, F.F.T., Vianu, V.: Towards a shared ledger business collaboration language based on data-aware processes. In: Sheng, Q.Z., Stroulia, E., Tata, S., Bhiri, S. (eds.) ICSOC 2016. LNCS, vol. 9936, pp. 18\u201336. Springer, Cham (2016). doi:10.1007\/978-3-319-46295-0_2"},{"key":"2_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-27152-1_1","volume-title":"Security Standardisation Research","author":"P McCorry","year":"2015","unstructured":"McCorry, P., Shahandashti, S.F., Clarke, D., Hao, F.: Authenticated key exchange over bitcoin. In: Chen, L., Matsuo, S. (eds.) SSR 2015. LNCS, vol. 9497, pp. 3\u201320. Springer, Cham (2015). doi:10.1007\/978-3-319-27152-1_1"},{"key":"2_CR39","doi-asserted-by":"crossref","unstructured":"Sun, J., Yan, J., Zhang, K.Z.K.: Blockchain-based sharing services: what blockchain technology can contribute to smart cities. Financ. Innov. 2, 26 (2016)","DOI":"10.1186\/s40854-016-0040-y"},{"key":"2_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/978-3-319-45348-4_19","volume-title":"Business Process Management","author":"I Weber","year":"2016","unstructured":"Weber, I., Xu, X., Riveret, R., Governatori, G., Ponomarev, A., Mendling, J.: Untrusted business process monitoring and execution using blockchain. In: La Rosa, M., Loos, P., Pastor, O. (eds.) BPM 2016. LNCS, vol. 9850, pp. 329\u2013347. Springer, Cham (2016). doi:10.1007\/978-3-319-45348-4_19"},{"key":"2_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1007\/978-3-319-25645-0_25","volume-title":"Security Standardisation Research","author":"D Wilson","year":"2015","unstructured":"Wilson, D., Ateniese, G.: From pretty good to great: enhancing PGP using bitcoin and the blockchain. In: Qiu, M., Xu, S., Yung, M., Zhang, H. (eds.) SSR 2015. LNCS, vol. 9497, pp. 368\u2013375. Springer, Cham (2015). doi:10.1007\/978-3-319-25645-0_25"},{"key":"2_CR42","doi-asserted-by":"crossref","unstructured":"Xu, J.J.: Are blockchains immune to all malicious attacks? Financ. Innov. 2, 25 (2016)","DOI":"10.1186\/s40854-016-0046-5"},{"key":"2_CR43","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1145\/1139922.1139945","volume":"49","author":"H Chesbrough","year":"2006","unstructured":"Chesbrough, H., Spohrer, J.: A research manifesto for services science. Commun. ACM 49, 33\u201340 (2006)","journal-title":"Commun. ACM"},{"key":"2_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1509\/jmkg.68.1.1.24036","volume":"68","author":"SL Vargo","year":"2004","unstructured":"Vargo, S.L., Lusch, R.F.: Evolving to a new dominant logic. J. Mark. 68, 1\u201317 (2004)","journal-title":"J. Mark."},{"key":"2_CR45","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1111\/j.1937-5956.2006.tb00248.x","volume":"15","author":"SE Sampson","year":"2006","unstructured":"Sampson, S.E., Froehle, C.M.: Foundations and implications of a proposed unified services theory. Prod. Oper. Manag. 15, 329\u2013343 (2006)","journal-title":"Prod. Oper. Manag."},{"key":"2_CR46","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1108\/03684920010322055","volume":"29","author":"A Backlund","year":"2000","unstructured":"Backlund, A.: The definition of system. Kybernetes 29, 444\u2013451 (2000)","journal-title":"Kybernetes"},{"key":"2_CR47","doi-asserted-by":"crossref","unstructured":"Spohrer, J., Maglio, P.P., Bailey, J., Gruhl, D.: Steps toward a science of service systems. Comput. (Long. Beach. Calif.) 40, 71\u201377 (2007)","DOI":"10.1109\/MC.2007.33"},{"key":"2_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jisss.2009070101","volume":"1","author":"J Spohrer","year":"2009","unstructured":"Spohrer, J., Kwan, S.K.: Service Science, Management, Engineering, and Design (SSMED). Int. J. Inf. Syst. Serv. Sect. 1, 1\u201331 (2009)","journal-title":"Int. J. Inf. Syst. Serv. Sect."},{"key":"2_CR49","unstructured":"Greenspan, G.: Four Genuine Blockchain Use Cases. http:\/\/www.coindesk.com\/four-genuine-blockchain-use-cases\/. Accessed 13 Nov 2016"},{"key":"2_CR50","doi-asserted-by":"publisher","first-page":"860","DOI":"10.1287\/mnsc.1110.1467","volume":"58","author":"RL Bray","year":"2012","unstructured":"Bray, R.L., Mendelson, H.: Information transmission and the bullwhip effect: an empirical investigation. Manag. Sci. 58, 860\u2013875 (2012)","journal-title":"Manag. Sci."}],"container-title":["Lecture Notes in Business Information Processing","Exploring Services Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-56925-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T13:26:25Z","timestamp":1710249985000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-56925-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319569246","9783319569253"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-56925-3_2","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"value":"1865-1348","type":"print"},{"value":"1865-1356","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"6 April 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IESS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Exploring Services Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rome","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 May 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 May 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icexss2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.itais.org\/conference\/iess2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}