{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T12:22:32Z","timestamp":1761740552649,"version":"3.40.3"},"publisher-location":"Cham","reference-count":53,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319584591"},{"type":"electronic","value":"9783319584607"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-58460-7_18","type":"book-chapter","created":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T11:08:42Z","timestamp":1494587322000},"page":"265-283","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["\u201cIf It Wasn\u2019t Secure, They Would Not Use It in the Movies\u201d \u2013 Security Perceptions and User Acceptance of Authentication Technologies"],"prefix":"10.1007","author":[{"given":"Verena","family":"Zimmermann","sequence":"first","affiliation":[]},{"given":"Nina","family":"Gerber","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,13]]},"reference":[{"key":"18_CR1","doi-asserted-by":"publisher","unstructured":"Abdullah, M.D.H., Abdullah, A.H., Ithnin, N., Mammi, H.K.: Towards identifying usability and security features of graphical password in knowledge based authentication technique. In: Second Asia International Conference on Modelling & Simulation (AMS), pp. 396\u2013403. IEEE Press, New York (2008). doi:10.1109\/AMS.2008.136","DOI":"10.1109\/AMS.2008.136"},{"key":"18_CR2","unstructured":"Al-Harby, F., Qahwaji, R., Kamala, M.: The feasibility of biometrics authentication in e-commerce: user acceptance. In: IADIS International Conference WWW\/Internet (2008)"},{"key":"18_CR3","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-1-84800-292-0_4","volume-title":"Guide to Biometric Reference Systems and Performance Evaluation","author":"F Alonso-Fernandez","year":"2009","unstructured":"Alonso-Fernandez, F., Bigun, J., Fierrez, J., Fronthaler, H., Kollreider, K., Ortega-Garcia, J.: Fingerprint Recognition. In: Petrovska-Delacr\u00e9taz, D., Chollet, G., Dorizzi, B. (eds.) Guide to Biometric Reference Systems and Performance Evaluation, pp. 51\u201388. Springer, London (2009)"},{"key":"18_CR4","doi-asserted-by":"publisher","unstructured":"Ben-Asher, N., Kirschnick, N., Sieger, H., Meyer, J., Ben-Oved, A., M\u00f6ller, S.: On the need for different security methods on mobile phones. In: The 13th International Conference on Human Computer Interaction with Mobile Devices and Services (MobileHCI 2011), pp. 465\u2013473. ACM Press, New York (2011). doi:10.1145\/2037373.2037442","DOI":"10.1145\/2037373.2037442"},{"key":"18_CR5","doi-asserted-by":"publisher","unstructured":"Bhagavatula, C., Ur, B., Iacovino, K., Kywe, S.M., Cranor, L.F., Savvides, M.: Biometric authentication on iphone and android: usability, perceptions, and influences on adoption. In: Workshop on Usable Security (2015). doi:10.14722\/usec.2015.23003","DOI":"10.14722\/usec.2015.23003"},{"key":"18_CR6","unstructured":"Blonder, G.: Graphical password. United States Patent 5559961, Lucent Technologies, Inc., Murray Hill (1996)"},{"key":"18_CR7","doi-asserted-by":"publisher","unstructured":"Bonneau, J., Herley, C., van Oorschot, P.C., Stajano, F.: The quest to replace passwords: a framework for comparative evaluation of web authentication schemes. In: IEEE Symposium on Security and Privacy, pp. 553\u2013567. IEEE Press, New York (2012). doi.10.1109\/SP.2012.44","DOI":"10.1109\/SP.2012.44"},{"key":"18_CR8","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/978-1-4471-0515-2_27","volume-title":"People and Computers XIV \u2013 Usability or Else: Proceedings of HCI","author":"S Brostoff","year":"2000","unstructured":"Brostoff, S., Sasse, M.A.: Are passfaces more usable than passwords: a field trial investigation. In: McDonald, S., Waern, Y., Cockton, G. (eds.) People and Computers XIV \u2013 Usability or Else: Proceedings of HCI, pp. 405\u2013422. Springer, Sunderland (2000). doi:10.1007\/978-1-4471-0515-2_27"},{"key":"18_CR9","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1080\/02642069.2011.622369","volume":"33","author":"K-Y Chen","year":"2013","unstructured":"Chen, K.-Y., Chang, M.-L.: User acceptance of \u2018near field communication\u2019 mobile phone service: an investigation based on the \u2018unified theory of acceptance and use of technology\u2019 model. Serv. Ind. J. 33, 609\u2013623 (2013). doi:10.1080\/02642069.2011.622369","journal-title":"Serv. Ind. J."},{"key":"18_CR10","unstructured":"Cherapau, I., Muslukhov, I., Asanka, N., Beznosov, K.: On the impact of touch ID on iPhone passcodes. In: Symposium on Usable Privacy and Security (SOUPS), pp. 257\u2013276 (2016)"},{"key":"18_CR11","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1016\/S0167-4048(02)00304-8","volume":"21","author":"N Clarke","year":"2002","unstructured":"Clarke, N., Furnell, S., Rodwell, P., Reynolds, P.: Acceptance of subscriber authentication methods for mobile telephony devices. Comput. Secur. 21, 220\u2013228 (2002). doi:10.1016\/S0167-4048(02)00304-8","journal-title":"Comput. Secur."},{"key":"18_CR12","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-1-84628-921-7_3","volume-title":"Advances in Biometrics. Sensors, Algorithms and Systems","author":"S Clausen","year":"2008","unstructured":"Clausen, S.: A single-line AC capacitive fingerprint swipe sensor. In: Ratha, N.K., Govindaraju, V. (eds.) Advances in Biometrics. Sensors, Algorithms and Systems, pp. 49\u201362. Springer, London (2008). doi:10.1007\/978-1-84628-921-7_3"},{"key":"18_CR13","unstructured":"Coventry, L., DeAngeli, A., Johnson, G.: Honest it\u2019s me! Self service verification. In: ACM CHI Workshop on Human-Computer Interaction and Security Systems (2003)"},{"key":"18_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/2196-064X-1-7","volume":"1","author":"H Crawford","year":"2014","unstructured":"Crawford, H., Renaud, K.: Understanding user perceptions of transparent authentication on a mobile device. J. Trust Manage. 1, 1\u20137 (2014). doi:10.1186\/2196-064X-1-7","journal-title":"J. Trust Manage."},{"key":"18_CR15","doi-asserted-by":"publisher","unstructured":"De Luca, A., Hang, A., von Zezschwitz, E., Hussmann, H.: I feel like I\u2019m taking selfies all day! Understanding biometric authentication on smartphones. In: Conference on Human Factors in Computing Systems, pp. 1411\u20131414. ACM Press, New York (2015). doi:10.1145\/2702123.2702141","DOI":"10.1145\/2702123.2702141"},{"key":"18_CR16","unstructured":"Dhamija, R., Perrig, A.: D\u00e9j\u00e0 Vu: a user study using images for authentication. In: The 9th USENIX Security Symposium, p. 4. The USENIX Association, Berkeley (2000)"},{"key":"18_CR17","first-page":"155","volume-title":"International Conference on Security and Cryptography (SECRYPT)","author":"T D\u00f6rflinger","year":"2010","unstructured":"D\u00f6rflinger, T., Voth, A., Kr\u00e4mer, J., Fromm, R.: \u201cMy smartphone is a safe!\u201d The user\u2019s point of view regarding novel authentication methods and gradual security levels on smartphones. In: Katsikas, S.K., Samarati, P. (eds.) International Conference on Security and Cryptography (SECRYPT), pp. 155\u2013164. IEEE Press, New York (2010)"},{"key":"18_CR18","first-page":"224","volume":"3","author":"UC Eze","year":"2008","unstructured":"Eze, U.C., Gan, G.G.G., Ademu, J., Tella, S.A.: Modelling user trust and mobile payment adoption: a conceptual Framework. Commun. IBIMA 3, 224\u2013231 (2008)","journal-title":"Commun. IBIMA"},{"key":"18_CR19","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/S1361-3723(07)70006-4","volume":"1","author":"S Furnell","year":"2007","unstructured":"Furnell, S., Evangelatos, K.: Public awareness and perceptions of biometrics. Comput. Fraud Secur. 1, 8\u201313 (2007). doi:10.1016\/S1361-3723(07)70006-4","journal-title":"Comput. Fraud Secur."},{"key":"18_CR20","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1016\/j.intcom.2011.03.007","volume":"23","author":"B Grawemeyer","year":"2011","unstructured":"Grawemeyer, B., Johnson, H.: Using and managing multiple passwords: a week to a view. Interact. Comput. 23, 256\u2013267 (2011). doi:10.1016\/j.intcom.2011.03.007","journal-title":"Interact. Comput."},{"key":"18_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-642-39077-7_13","volume-title":"Privacy Enhancing Technologies","author":"M Harbach","year":"2013","unstructured":"Harbach, M., Fahl, S., Rieger, M., Smith, M.: On the acceptance of privacy-preserving authentication technology: the curious case of national identity cards. In: Cristofaro, E., Wright, M. (eds.) PETS 2013. LNCS, vol. 7981, pp. 245\u2013264. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-39077-7_13"},{"key":"18_CR22","unstructured":"Harbach, M., von Zezschwitz, E., Fichtner, A., De Luca, A., Smith, M.: It\u2019s a hard lock life: a field study of smartphone (un) locking behavior and risk perception. In: Symposium on Usable Privacy and Security (SOUPS), pp. 213\u2013230 (2014)"},{"key":"18_CR23","doi-asserted-by":"publisher","unstructured":"Heckle, R.-R., Patrick, A.S., Ozok, A.: Perception and acceptance of fingerprint biometric technology. In: The 3rd Symposium on Usable Privacy and Security, pp. 153\u2013154 (2007). doi:10.1145\/1280680.1280704","DOI":"10.1145\/1280680.1280704"},{"key":"18_CR24","doi-asserted-by":"publisher","unstructured":"Holz, C., Bentley, F.R.: On-demand biometrics: fast cross-device authentication. In: CHI Conference on Human Factors in Computing Systems, pp. 3761\u20133766. ACM Press, New York (2016). doi:10.1145\/2858036.2858139","DOI":"10.1145\/2858036.2858139"},{"key":"18_CR25","doi-asserted-by":"crossref","unstructured":"Holz, C., Buthpitiya, S., Knaust, M.: Bodyprint: biometric user identification on mobile devices using the capacitive touchscreen to scan body parts. In: The 33rd Annual ACM Conference on Human Factors in Computing Systems, pp. 3011\u20133014. ACM Press, New York (2015)","DOI":"10.1145\/2702123.2702518"},{"key":"18_CR26","volume-title":"Ear Identification","author":"AV Iannarelli","year":"1989","unstructured":"Iannarelli, A.V.: Ear Identification. Paramont Publishing Company, Paramount (1989)"},{"key":"18_CR27","unstructured":"International Civil Aviation Organization: Biometric Identification To Provide Enhanced Security And Speedier Border Clearance For Travelling Public (PIO 09\/2003). http:\/\/www.icao.int\/icao\/en\/nr\/2003\/pio200309.htm"},{"key":"18_CR28","unstructured":"Jermyn, I., Mayer, A., Monrose, F., Reiter, M.K., Rubin, A.D.: The design and analysis of graphical passwords. In: The 8th USENIX Security Symposium, p. 1. The USENIX Association, Berkeley (1999)"},{"key":"18_CR29","doi-asserted-by":"publisher","unstructured":"Jones, L.A., Anton, A.I., Earp, J.B.: Towards understanding user perceptions of authentication technologies. In: ACM Workshop on Privacy in Electronic Society, pp. 91\u201398. ACM Press, New York (2007). doi:10.1145\/1314333.1314352","DOI":"10.1145\/1314333.1314352"},{"key":"18_CR30","unstructured":"Karatzouni, S., Furnell, S.M., Clarke, N.L., Botha, R.A.: Perceptions of user authentication on mobile devices. In: International Conference for Internet Technology and Secured Transactions (ICITST), IEEE Press, New York (2011)"},{"key":"18_CR31","doi-asserted-by":"publisher","unstructured":"Ma, Y., Feng, J.: Evaluating usability of three authentication methods in web-based application. In: Ninth International Conference on Software Engineering Research, Management and Applications (SERA), pp. 81\u201388. IEEE Press, New York (2011). doi:10.1109\/SERA.2011.18","DOI":"10.1109\/SERA.2011.18"},{"key":"18_CR32","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1109\/34.990140","volume":"24","author":"D Maio","year":"2002","unstructured":"Maio, D., Maltoni, D., Capelli, R., Wayman, J.L., Jain, A.K.: FVC2000: fingerprint verification competition. IEEE Trans. Pattern Anal. Mach. Intell. 24, 402\u2013412 (2002)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"18_CR33","unstructured":"Mare, S., Baker, M., Gummeson, J.: A study of authentication in daily life. In: Symposium on Usable Privacy and Security (SOUPS), pp. 189\u2013206 (2016)"},{"key":"18_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-642-39188-0_21","volume-title":"Universal Access in Human-Computer Interaction. Design Methods, Tools, and Interaction Techniques for eInclusion","author":"LM Mayron","year":"2013","unstructured":"Mayron, L.M., Hausawi, Y., Bahr, G.S.: Secure, usable biometric authentication systems. In: Stephanidis, C., Antona, M. (eds.) UAHCI 2013. LNCS, vol. 8009, pp. 195\u2013204. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-39188-0_21"},{"key":"18_CR35","doi-asserted-by":"publisher","first-page":"2021","DOI":"10.1109\/JPROC.2003.819611","volume":"91","author":"L O\u2019Gorman","year":"2003","unstructured":"O\u2019Gorman, L.: Comparing passwords, tokens, and biometrics for user authentication. Proc. IEEE 91, 2021\u20132040 (2003). doi:10.1109\/JPROC.2003.819611. IEEE, New York","journal-title":"Proc. IEEE"},{"key":"18_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-23768-3_1","volume-title":"Human-Computer Interaction \u2013 INTERACT 2011","author":"CL Paul","year":"2011","unstructured":"Paul, C.L., Morse, E., Zhang, A., Choong, Y.-Y., Theofanos, M.: A field study of user behavior and perceptions in smartcard authentication. In: Campos, P., Graham, N., Jorge, J., Nunes, N., Palanque, P., Winckler, M. (eds.) INTERACT 2011. LNCS, vol. 6949, pp. 1\u201317. Springer, Heidelberg (2011). doi:10.1007\/978-3-642-23768-3_1"},{"key":"18_CR37","unstructured":"Real User Corporation, Passfaces TM. http\/\/:www.realuser.com"},{"key":"18_CR38","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/s00146-009-0218-1","volume":"24","author":"C Riley","year":"2009","unstructured":"Riley, C., Buckner, K., Johnson, G., Benyon, D.: Culture & biometrics: regional differences in the perception of biometric authentication technologies. AI Soc. 24, 295\u2013306 (2009). doi:10.1007\/s00146-009-0218-1","journal-title":"AI Soc."},{"key":"18_CR39","first-page":"319","volume-title":"Trust and Crime in Information Societies","author":"MA Sasse","year":"2005","unstructured":"Sasse, M.A.: Usability and trust in information systems. In: Mansell, R., Collins, B. (eds.) Trust and Crime in Information Societies, pp. 319\u2013348. Edward Elgar, Cheltenham (2005)"},{"key":"18_CR40","unstructured":"Scheuermann, D., Schwiderski-Grosche, S., Struif, B.: Usability of biometrics in relation to electronic signatures. Report, GMD-Forschungszentrum Informationstechnik (2000)"},{"key":"18_CR41","volume-title":"Secrets and Lies: Digital Security in a Networked World","author":"B Schneier","year":"2000","unstructured":"Schneier, B.: Secrets and Lies: Digital Security in a Networked World. Wiley, Hoboken (2000)"},{"key":"18_CR42","doi-asserted-by":"publisher","unstructured":"Sieger, H., M\u00f6ller, S.: Gender differences in the perception of security of mobile phones. In: The 14th International Conference on Human-Computer Interaction with Mobile Devices and Services Companion, pp. 107\u2013112. ACM Press, New York (2012). doi:10.1145\/2371664.2371685","DOI":"10.1145\/2371664.2371685"},{"key":"18_CR43","doi-asserted-by":"publisher","unstructured":"Stobert, E., Biddle, R.: Memory retrieval and graphical passwords. In: The Ninth Symposium on Usable Privacy and Security, Article 15. ACM Press, New York (2013). doi:10.1145\/2501604.2501619","DOI":"10.1145\/2501604.2501619"},{"key":"18_CR44","doi-asserted-by":"crossref","unstructured":"Tassabehji, R., Kamala, M.A.: Improving e-banking security with biometrics: modelling user attitudes and acceptance. In: The 3rd International Conference on New Technologies, Mobility and Security, pp. 110\u2013115. IEEE Press, Piscataway (2009)","DOI":"10.1109\/NTMS.2009.5384806"},{"key":"18_CR45","doi-asserted-by":"publisher","unstructured":"Tari, F., Ozok, A.A., Holden, S.H.: A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords. In: The Second Symposium on Usable Privacy and Security, pp. 56\u201366. ACM, New York (2006). doi:10.1145\/1143120.1143128","DOI":"10.1145\/1143120.1143128"},{"key":"18_CR46","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1016\/j.intcom.2006.01.004","volume":"18","author":"DT Toledano","year":"2006","unstructured":"Toledano, D.T., Pozo, R.F., Trapote, A.H., Gomez, L.H.: Usability evaluation of multi-modal biometric verification systems. Interact. Comput. 18, 1101\u20131122 (2006). doi:10.1016\/j.intcom.2006.01.004","journal-title":"Interact. Comput."},{"key":"18_CR47","doi-asserted-by":"publisher","unstructured":"Trewin, S., Swart, C., Koved, L., Martino, J., Singh, K., Ben-David, S.: Biometric authentication on a mobile device: a study of user effort, error and task disruption. In: The 28th Annual Computer Security Applications Conference, pp. 159\u2013168. ACM Press, New York (2012). doi:10.1145\/2420950.2420976","DOI":"10.1145\/2420950.2420976"},{"key":"18_CR48","doi-asserted-by":"publisher","first-page":"718","DOI":"10.1177\/154193120605000522","volume":"50","author":"C Turner","year":"2006","unstructured":"Turner, C., Safar, J., Ramaswamy, K.: The effects of use on acceptance and trust in voice authentication technology. Proc. Hum. Factors Ergon. Soc. Annu. Meet. 50, 718\u2013722 (2006). doi:10.1177\/154193120605000522","journal-title":"Proc. Hum. Factors Ergon. Soc. Annu. Meet."},{"key":"18_CR49","doi-asserted-by":"crossref","unstructured":"Von Zezschwitz, E., Koslow, A., De Luca, A., Hussmann, H.: Making graphic-based authentication secure against smudge attacks. In: The 2013 International Conference on Intelligent User Interfaces, pp. 277\u2013286. ACM Press, New York (2013)","DOI":"10.1145\/2449396.2449432"},{"key":"18_CR50","doi-asserted-by":"publisher","first-page":"1297","DOI":"10.1109\/TPAMI.2007.1067","volume":"29","author":"P Yan","year":"2007","unstructured":"Yan, P., Bowyer, K.W.: Biometric recognition using 3D ear shape. IEEE Trans. Pattern Anal. Mach. Intell. 29, 1297\u20131308 (2007). doi:10.1109\/TPAMI.2007.1067","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"18_CR51","unstructured":"Wash, R., Rader, E., Berman, R., Wellmer, Z.: Understanding password choices: how frequently entered passwords are re-used across websites. In: Symposium on Usable Privacy and Security (SOUPS), pp. 175\u2013188 (2016)"},{"key":"18_CR52","doi-asserted-by":"publisher","unstructured":"Weiss, R., De Luca, A.: PassShapes: utilizing stroke based authentication to increase password memorability. In: Proceedings of the 5th Nordic Conference on Human-Computer Interaction: Building Bridges, pp. 383\u2013392. ACM Press, New York (2008). doi:10.1145\/1463160.1463202","DOI":"10.1145\/1463160.1463202"},{"key":"18_CR53","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.ijhcs.2005.04.010","volume":"63","author":"S Wiedenbeck","year":"2005","unstructured":"Wiedenbeck, S., Waters, J., Birget, J.-C., Brodskiy, A., Memon, N.: Passpoints: design and longitudinal evaluation of a graphical password system. Int. J. Hum. Comput. Stud. 63, 102\u2013127 (2005). doi:10.1016\/j.ijhcs.2005.04.010","journal-title":"Int. J. Hum. Comput. Stud."}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-58460-7_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T01:57:17Z","timestamp":1625104637000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-58460-7_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319584591","9783319584607"],"references-count":53,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-58460-7_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"13 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human Aspects of Information Security, Privacy, and Trust","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vancouver, BC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"has2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}