{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T12:22:27Z","timestamp":1761740547562,"version":"3.40.3"},"publisher-location":"Cham","reference-count":48,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319584591"},{"type":"electronic","value":"9783319584607"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-58460-7_1","type":"book-chapter","created":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T11:08:42Z","timestamp":1494587322000},"page":"3-13","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["The Design of Messages to Improve Cybersecurity Incident Reporting"],"prefix":"10.1007","author":[{"given":"Pam","family":"Briggs","sequence":"first","affiliation":[]},{"given":"Debora","family":"Jeske","sequence":"additional","affiliation":[]},{"given":"Lynne","family":"Coventry","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,13]]},"reference":[{"issue":"4","key":"1_CR1","first-page":"1012","volume":"31","author":"B Zhao","year":"2006","unstructured":"Zhao, B., Olivera, F.: Error reporting in organizations. Acad. Manag. Rev. 31(4), 1012\u20131030 (2006). http:\/\/www.jstor.org\/stable\/20159263","journal-title":"Manag. Rev."},{"key":"1_CR2","doi-asserted-by":"publisher","first-page":"2702","DOI":"10.1287\/mnsc.2013.1728","volume":"59","author":"T August","year":"2013","unstructured":"August, T., Niculescu, M.F.: The influence of software process maturity and customer error reporting on software release and pricing. Manag. Sci. 59, 2702\u20132726 (2013). doi:10.1287\/mnsc.2013.1728","journal-title":"Manag. Sci."},{"key":"1_CR3","unstructured":"Singh, R., Pace, W., Singh, A., Fox, C., Singh, G.: A visual computer interface concept for making error reporting useful at the point of care. In: Henriksen, K., Battles, J.B., Keyes, M.A., et al. (eds.) Advances in Patient Safety: New Directions and Alternative Approaches, Assessment, vol. 1. Agency for Healthcare Research and Quality, Rockville (2008)"},{"key":"1_CR4","doi-asserted-by":"publisher","unstructured":"Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: user attention, comprehension, and behavior. In: Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS). ACM, New York (2012). Article No. 3. doi:10.1145\/2335356.2335360","DOI":"10.1145\/2335356.2335360"},{"key":"1_CR5","doi-asserted-by":"publisher","unstructured":"Egelman, S., Cranor, L.F., Hong, J.: You\u2019ve been warned: an empirical study of the effectiveness of web browser phishing warnings. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1065\u20131074. ACM, New York (2008). doi:10.1145\/1357054.1357219","DOI":"10.1145\/1357054.1357219"},{"key":"1_CR6","unstructured":"ICS CERT. (2015). https:\/\/ics-cert.us-cert.gov\/sites\/default\/files\/Annual_Reports\/Year_in_Review_FY2015_Final_S508C.pdf"},{"key":"1_CR7","doi-asserted-by":"publisher","unstructured":"Bravo-Lillo, C., Komanduri, S., Cranor, L.F., Reeder, R.W., Sleeper, M., Downs, J., Schechter, S.: Your attention please. Designing security-decision UIs to make genuine risks harder to ignore. In: Proceedings of Symposium on Usable Privacy and Security (SOUPS). ACM, New York (2013). Article 6. doi:10.1145\/2501604.2501610","DOI":"10.1145\/2501604.2501610"},{"key":"1_CR8","volume-title":"Warning Design Guidelines","author":"L Bauer","year":"2013","unstructured":"Bauer, L., Bravo-Lillo, C.L., Cranor, F., Fragkaki, E.: Warning Design Guidelines. Carnegie Mellon University, Pittsburgh (2013)"},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1007\/978-3-642-41320-9_7","volume-title":"Financial Cryptography and Data Security","author":"M Harbach","year":"2013","unstructured":"Harbach, M., Fahl, S., Yakovleva, P., Smith, M.: Sorry, I don\u2019t get it: an analysis of warning message texts. In: Adams, A.A., Brenner, M., Smith, M. (eds.) FC 2013. LNCS, vol. 7862, pp. 94\u2013111. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-41320-9_7"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Motiee, S., Hawkey, K., Beznosov, K.: Investigating user account control practices. In: Proceedings of the 28th of the International Conference Extended Abstracts on Human Factors in Computing Systems, pp. 4129\u20134134. ACM (2010)","DOI":"10.1145\/1753846.1754114"},{"key":"1_CR11","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.ijhcs.2005.04.009","volume":"63","author":"RA Maxion","year":"2005","unstructured":"Maxion, R.A., Reeder, R.W.: Improving user-interface dependability through mitigation of human error. Int. J. Hum.-Comput. Stud. 63, 25\u201350 (2005). doi:10.1016\/j.ijhcs.2005.04.009","journal-title":"Int. J. Hum.-Comput. Stud."},{"key":"1_CR12","doi-asserted-by":"publisher","unstructured":"B\u00f6hme, R., Grossklags, J.: The security cost of cheap user interaction. In: Proceedings of the New Security Paradigms Workshop (NSPW 2011). pp. 67\u201382. ACM, New York (2011). doi:10.1145\/2073276.2073284","DOI":"10.1145\/2073276.2073284"},{"key":"1_CR13","unstructured":"Akhawe, D., Porter Felt, A.: Alice in warning land: a large-scale field study of browser security warning effectiveness. In: Proceedings of the 22nd USENIX Security Symposium, pp. 257\u2013272 (2013). https:\/\/www.usenix.org\/system\/files\/conference\/usenixsecurity13\/sec13-paper_akhawe.pdf"},{"key":"1_CR14","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.chb.2014.09.014","volume":"41","author":"D Modic","year":"2014","unstructured":"Modic, D., Anderson, R.: Reading this may harm your computer: the psychology of malware warnings. Comp. Hum. Behav. 41, 71\u201379 (2014). doi:10.1016\/j.chb.2014.09.014","journal-title":"Comp. Hum. Behav."},{"key":"1_CR15","unstructured":"Sunshine, J., Egelman, S., Almuhimedi, H., Atri, N., Cranor, L.F.: Crying wolf: an empirical study of SSL warning effectiveness. In: Proceedings of the USENIX Security Symposium, pp. 399\u2013416. ACM, New York (2009). http:\/\/static.usenix.org\/legacy\/events\/sec09\/tech\/full_papers\/sec09_browser.pdf"},{"key":"1_CR16","doi-asserted-by":"publisher","unstructured":"Harbach, M., Hettig, M., Weber, S., Smith, M.: Using personal examples to improve risk communication for security and privacy decisions. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2647\u20132656. ACM, New York (2014). doi:10.1145\/2556288.2556978","DOI":"10.1145\/2556288.2556978"},{"key":"1_CR17","unstructured":"Kauer, M., Pfeiffer, T., Vokamer, M., Theuerling, H., Bruder, R.: It is not about the design - it is about the content! Making warnings more efficient by communicating risks appropriately. In: Proceedings of Conference: Sicherheit\u2013 Sicherheit, Schutz und Zuverl\u00e4ssigkeit (2012). http:\/\/tuprints.ulb.tu-darmstadt.de\/3092\/4\/ItIsNotAboutTheDesignItIsAboutTheContent.pdf"},{"key":"1_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/978-3-642-38908-5_16","volume-title":"Trust and Trustworthy Computing","author":"S Bartsch","year":"2013","unstructured":"Bartsch, S., Volkamer, M., Theuerling, H., Karayumak, F.: Contextualized web warnings, and how they cause distrust. In: Huth, M., Asokan, N., \u010capkun, S., Flechais, I., Coles-Kemp, L. (eds.) Trust 2013. LNCS, vol. 7904, pp. 205\u2013222. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-38908-5_16"},{"key":"1_CR19","doi-asserted-by":"publisher","unstructured":"Krol, K., Moroz, M., Sasse, M.A.: Don\u2019t work. Can\u2019t work? Why it\u2019s time to rethink security warnings. In: Proceedings of 7th International Conference on Risks and Security of Internet and Systems (CRiSIS), pp. 1\u201310. IEEE (2012). doi:10.1109\/CRISIS.2012.6378951","DOI":"10.1109\/CRISIS.2012.6378951"},{"key":"1_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/978-3-642-39884-1_5","volume-title":"Financial Cryptography and Data Security","author":"S Egelman","year":"2013","unstructured":"Egelman, S., Schechter, S.: The importance of being earnest [in security warnings]. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 52\u201359. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-39884-1_5"},{"key":"1_CR21","doi-asserted-by":"publisher","unstructured":"Beautement, A., Sasse, M.A., Wonham, M.: The compliance budget: managing security behaviour in organisations. In: Proceedings of the New Security Paradigms Workshop (NSWP 2008), pp. 47\u201358. ACM, New York (2008). doi:10.1145\/1595676.1595684","DOI":"10.1145\/1595676.1595684"},{"key":"1_CR22","doi-asserted-by":"publisher","unstructured":"Herley, C.: So long, and no thanks for the externalities: the rational rejection of security advice by users. In: Proceedings of the New Security Paradigms Workshop (NSPW), pp. 133\u2013144. ACM, New York (2009). doi:10.1145\/1719030.1719050","DOI":"10.1145\/1719030.1719050"},{"key":"1_CR23","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1016\/j.ijhcs.2013.01.001","volume":"71","author":"GB Duggan","year":"2013","unstructured":"Duggan, G.B., Johnson, H., S\u00f8rli, P.: Interleaving tasks to improve performance: users maximise the marginal rate of return. Int. J. Hum.-Comput. Stud. 71, 533\u2013550 (2013). doi:10.1016\/j.ijhcs.2013.01.001","journal-title":"Int. J. Hum.-Comput. Stud."},{"key":"1_CR24","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.ijhcs.2015.01.003","volume":"79","author":"FA Drews","year":"2015","unstructured":"Drews, F.A., Musters, A.: Individual differences in interrupted task performance: one size does not fit all. Int. J. Hum.-Comput. Stud. 79, 97\u2013105 (2015). doi:10.1016\/j.ijhcs.2015.01.003","journal-title":"Int. J. Hum.-Comput. Stud."},{"key":"1_CR25","doi-asserted-by":"publisher","unstructured":"Nurse\u201a J.R.C., Creese\u201a S., Goldsmith, M., Lamberts, K.: Guidelines for usable cybersecurity: past and present. In: Proceedings of the 5th International Conference on Network and System Security (NSS), pp. 21\u201326 (2011). doi:10.1109\/CSS.2011.6058566","DOI":"10.1109\/CSS.2011.6058566"},{"key":"1_CR26","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1080\/00223980.1975.9915803","volume":"91","author":"RW Rogers","year":"1975","unstructured":"Rogers, R.W.: A protection motivation theory of fear appeals and attitude change. J. Psychol. 91, 93\u2013114 (1975). doi:10.1080\/00223980.1975.9915803","journal-title":"J. Psychol."},{"key":"1_CR27","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1016\/S1361-3723(08)70175-1","volume":"12","author":"S Furnell","year":"2008","unstructured":"Furnell, S., Shams, R., Phippen, A.: Who guides the little guy? Exploring security advice and guidance from retailers and ISPs. Comput. Fraud Secur. 12, 6\u201310 (2008). doi:10.1016\/S1361-3723(08)70175-1","journal-title":"Comput. Fraud Secur."},{"key":"1_CR28","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1057\/ejis.2009.6","volume":"18","author":"T Herath","year":"2009","unstructured":"Herath, T., Raghav Rao, H.: Protection motivation and deterrence: a framework for security policy compliance in organisations. Eur. J. Inf. Syst. 18, 106\u2013125 (2009). doi:10.1057\/ejis.2009.6","journal-title":"Eur. J. Inf. Syst."},{"key":"1_CR29","doi-asserted-by":"publisher","unstructured":"Howe, A.E., Ray, I., Roberts, M., Urbanska, M., Byrne, Z.: The psychology of security for the home computer user. In: Proceedings of IEEE Symposium on Security and Privacy. IEEE, pp. 209\u2013223 (2012). doi:10.1109\/SP.2012.23","DOI":"10.1109\/SP.2012.23"},{"key":"1_CR30","doi-asserted-by":"publisher","first-page":"2799","DOI":"10.1016\/j.chb.2008.04.005","volume":"24","author":"M Workman","year":"2008","unstructured":"Workman, M., Bommer, W.H., Straub, D.: Security lapses and the omission of information security measures: a threat model and empirical test. Comput. Hum. Behav. 24, 2799\u20132816 (2008). doi:10.1016\/j.chb.2008.04.005","journal-title":"Comput. Hum. Behav."},{"key":"1_CR31","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1518\/001872007X312487","volume":"49","author":"RJ Holden","year":"2007","unstructured":"Holden, R.J., Karsh, B.-T.: A review of medical error reporting system design considerations and a proposed cross-level systems research framework. Hum. Factors 49, 257\u2013276 (2007). doi:10.1518\/001872007X312487","journal-title":"Hum. Factors"},{"key":"1_CR32","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1037\/0022-3514.65.4.681","volume":"65","author":"SJ Karau","year":"1993","unstructured":"Karau, S.J., Williams, K.D.: Social loafing: a meta-analytic review and theoretical integration. J. Pers. Soc. Psychol. 65, 681\u2013706 (1993). doi:10.1037\/0022-3514.65.4.681","journal-title":"J. Pers. Soc. Psychol."},{"key":"1_CR33","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1111\/1467-8721.ep10772570","volume":"4","author":"SJ Karau","year":"1995","unstructured":"Karau, S.J., Williams, K.D.: Social loafing: research findings, implications, and future directions. Curr. Dir. Psychol. Sci. 4, 134\u2013140 (1995). doi:10.1111\/1467-8721.ep10772570","journal-title":"Curr. Dir. Psychol. Sci."},{"key":"1_CR34","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1037\/0022-3514.44.1.78","volume":"44","author":"NL Kerr","year":"1983","unstructured":"Kerr, N.L., Bruun, S.E.: Dispensability of member effort and group motivation losses: free-rider effects. J. Pers. Soc. Psychol. 44, 78\u201394 (1983). doi:10.1037\/0022-3514.44.1.78","journal-title":"J. Pers. Soc. Psychol."},{"key":"1_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0022-1031(87)90022-9","volume":"23","author":"SG Harkins","year":"1987","unstructured":"Harkins, S.G.: Social loafing and social facilitation. J. Exp. Soc. Psychol. 23, 1\u201318 (1987). doi:10.1016\/0022-1031(87)90022-9","journal-title":"J. Exp. Soc. Psychol."},{"key":"1_CR36","doi-asserted-by":"publisher","first-page":"47","DOI":"10.3102\/00346543058001047","volume":"58","author":"R Hembree","year":"1988","unstructured":"Hembree, R.: Correlates, causes, effects, and treatment of test anxiety. Rev. Educ. Res. 58, 47\u201377 (1988). doi:10.2307\/1170348","journal-title":"Rev. Educ. Res."},{"key":"1_CR37","doi-asserted-by":"publisher","first-page":"937","DOI":"10.1037\/0022-3514.49.4.937","volume":"49","author":"JM Jackson","year":"1985","unstructured":"Jackson, J.M., Williams, K.D.: Social loafing on difficult tasks: working collectively can improve performance. J. Pers. Soc. Psychol. 49, 937\u2013942 (1985). doi:10.1037\/0022-3514.49.4.937","journal-title":"J. Pers. Soc. Psychol."},{"key":"1_CR38","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1207\/s15326985ep2003_3","volume":"20","author":"S Tobias","year":"1985","unstructured":"Tobias, S.: Test anxiety: interference, defective skills, and cognitive capacity. Educ. Psychol. 20, 135\u2013142 (1985). doi:10.1207\/s15326985ep2003_3","journal-title":"Educ. Psychol."},{"key":"1_CR39","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1177\/0146167284101011","volume":"10","author":"SJ Zaccaro","year":"1984","unstructured":"Zaccaro, S.J.: Social loafing: the role of task attractiveness. Pers. Soc. Psychol. Bull. 10, 99\u2013106 (1984). doi:10.1177\/0146167284101011","journal-title":"Pers. Soc. Psychol. Bull."},{"key":"1_CR40","doi-asserted-by":"publisher","first-page":"1214","DOI":"10.1037\/0022-3514.43.6.1214","volume":"43","author":"SG Harkins","year":"1982","unstructured":"Harkins, S.G., Petty, R.E.: Effects of task difficulty and task uniqueness on social loafing. J. Pers. Soc. Psychol. 43, 1214\u20131229 (1982). doi:10.1037\/0022-3514.43.6.1214","journal-title":"J. Pers. Soc. Psychol."},{"key":"1_CR41","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/BF02230973","volume":"9","author":"TL Robbins","year":"1995","unstructured":"Robbins, T.L.: Social loafing on cognitive tasks: an examination of the \u201csucker effect\u201d. J. Bus. Psychol. 9, 337\u2013342 (1995). doi:10.1007\/BF02230973","journal-title":"J. Bus. Psychol."},{"key":"1_CR42","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1037\/0022-3514.41.5.847","volume":"41","author":"RE Petty","year":"1981","unstructured":"Petty, R.E., Cacioppo, J.T., Goldman, R.: Personal involvement as a determinant of argument-based persuasion. J. Pers. Soc. Psychol. 41, 847\u2013855 (1981). doi:10.1037\/0022-3514.41.5.847","journal-title":"J. Pers. Soc. Psychol."},{"key":"1_CR43","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.im.2012.04.002","volume":"49","author":"A Vance","year":"2012","unstructured":"Vance, A., Siponen, M., Pahnila, S.: Motivating IS security compliance: insights from habit and protection motivation theory. Inf. Manag. 49, 190\u2013198 (2012). doi:10.1016\/j.im.2012.04.002","journal-title":"Inf. Manag."},{"key":"1_CR44","doi-asserted-by":"publisher","first-page":"36","DOI":"10.5694\/j.1326-5377.2004.tb06158.x","volume":"181","author":"MJ Kingston","year":"2004","unstructured":"Kingston, M.J., Evans, S.M., Smith, B.J., Berry, J.G.: Attitudes of doctors and nurses towards incident reporting: a qualitative analysis. Med. J. Aust. 181, 36\u201339 (2004)","journal-title":"Med. J. Aust."},{"key":"1_CR45","doi-asserted-by":"crossref","unstructured":"Brustoloni, J.C., Villamarin-Salomon, R.: Improving security decisions with polymorphic and audited dialogs. In: Symposium on Usable Privacy and Security (SOUPS) 2007, 18\u201320 July 2007, Pittsburgh, PA, USA (2007)","DOI":"10.1145\/1280680.1280691"},{"key":"1_CR46","doi-asserted-by":"crossref","unstructured":"Gross, R., Acquisti, A.: Information revelation and privacy in online social networks (the Facebook case). In: ACM Workshop on Privacy in the Electronic Society (WPES), 7 November 2005, Alexandria, Virginia, USA (2005)","DOI":"10.1145\/1102199.1102214"},{"key":"1_CR47","doi-asserted-by":"publisher","first-page":"570","DOI":"10.1108\/02635571111133551","volume":"111","author":"J Sun","year":"2011","unstructured":"Sun, J., Ahluwalia, P., Koong, K.S.: The more secure the better? A study of information security readiness. Ind. Manag. Data Syst. 111, 570\u2013588 (2011)","journal-title":"Ind. Manag. Data Syst."},{"key":"1_CR48","doi-asserted-by":"crossref","unstructured":"Wang,Y., Leon, P.G., Acquisti, A., Faith Cranor, L., Forget, A., Sadeh, N.: A field trial of privacy nudges for Facebook. In: CHI 2014, 26 April\u201301 May 2014, Toronto, ON, Canada (2014)","DOI":"10.1145\/2556288.2557413"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-58460-7_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T01:51:03Z","timestamp":1625104263000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-58460-7_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319584591","9783319584607"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-58460-7_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"13 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human Aspects of Information Security, Privacy, and Trust","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vancouver, BC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"has2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}