{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T21:30:45Z","timestamp":1742938245346,"version":"3.40.3"},"publisher-location":"Cham","reference-count":50,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319929248"},{"type":"electronic","value":"9783319929255"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-92925-5_22","type":"book-chapter","created":{"date-parts":[[2018,6,8]],"date-time":"2018-06-08T13:48:35Z","timestamp":1528465715000},"page":"330-345","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["mHealth Applications for Goal Management Training - Privacy Engineering in Neuropsychological Studies"],"prefix":"10.1007","author":[{"given":"Alexander","family":"Gabel","sequence":"first","affiliation":[]},{"given":"Ina","family":"Schiering","sequence":"additional","affiliation":[]},{"given":"Sandra Verena","family":"M\u00fcller","sequence":"additional","affiliation":[]},{"given":"Funda","family":"Ertas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,9]]},"reference":[{"key":"22_CR1","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1186\/s12911-017-0408-6","volume":"17","author":"FA Allaert","year":"2017","unstructured":"Allaert, F.A., Mazen, N.J., Legrand, L., Quantin, C.: The tidal waves of connected health devices with healthcare applications: consequences on privacy and care management in European healthcare systems. BMC Med. Inf. Decis. Making 17, 10 (2017). https:\/\/doi.org\/10.1186\/s12911-017-0408-6","journal-title":"BMC Med. Inf. Decis. Making"},{"issue":"6","key":"22_CR2","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MSP.2004.97","volume":"2","author":"DE Bakken","year":"2004","unstructured":"Bakken, D.E., Rarameswaran, R., Blough, D.M., Franz, A.A., Palmer, T.J.: Data obfuscation: anonymity and desensitization of usable data sets. IEEE Secur. Priv. 2(6), 34\u201341 (2004)","journal-title":"IEEE Secur. Priv."},{"key":"22_CR3","unstructured":"Bauer, A., Hebeisen, C.: Igexin advertising network put user privacy at risk, August 2017. https:\/\/blog.lookout.com\/igexin-malicious-sdk"},{"issue":"2","key":"22_CR4","doi-asserted-by":"publisher","first-page":"e24","DOI":"10.2196\/mhealth.3328","volume":"2","author":"S Becker","year":"2014","unstructured":"Becker, S., Miron-Shatz, T., Schumacher, N., Krocza, J., Diamantidis, C., Albrecht, U.V.: mHealth 2.0: experiences, possibilities, and perspectives. JMIR mHealth uHealth 2(2), e24 (2014)","journal-title":"JMIR mHealth uHealth"},{"key":"22_CR5","unstructured":"Bertens, D.: Doin\u2019 it right: assessment and errorless learning of executive skills after brain injury. [S.l. : s.n.] (2016). http:\/\/repository.ubn.ru.nl\/handle\/2066\/149530"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP 2007), pp. 321\u2013334, May 2007","DOI":"10.1109\/SP.2007.11"},{"key":"22_CR7","unstructured":"Bier, C., Krempel, E.: Common privacy patterns in video surveillance and smart energy. In: 2012 7th International Conference on Computing and Convergence Technology (ICCCT), pp. 610\u2013615. IEEE (2012). http:\/\/ieeexplore.ieee.org\/abstract\/document\/6530407\/"},{"key":"22_CR8","unstructured":"Bitglass: The 2014 Bitglass healthcare breach report (2014). https:\/\/pages.bitglass.com\/pr-2014-healthcare-breach-report.html"},{"key":"22_CR9","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1515\/popets-2016-0038","volume":"2016","author":"C B\u00f6sch","year":"2016","unstructured":"B\u00f6sch, C., Erb, B., Kargl, F., Kopp, H., Pfattheicher, S.: Tales from the dark side: privacy dark strategies and privacy dark patterns. Proc. Priv. Enhanc. Technol. 2016, 237\u2013254 (2016)","journal-title":"Proc. Priv. Enhanc. Technol."},{"key":"22_CR10","doi-asserted-by":"publisher","first-page":"160011","DOI":"10.1038\/sdata.2016.11","volume":"3","author":"BM Bot","year":"2016","unstructured":"Bot, B.M., Suver, C., Neto, E.C., Kellen, M., Klein, A., Bare, C., Doerr, M., Pratap, A., Wilbanks, J., Dorsey, E.R., Friend, S.H., Trister, A.D.: The mPower study, Parkinson disease mobile data collected using ResearchKit. Sci. Data 3, 160011 (2016). http:\/\/www.nature.com\/articles\/sdata201611","journal-title":"Sci. Data"},{"key":"22_CR11","unstructured":"Cavoukian, A.: Privacy by design: the 7 foundational principles. Implementation and mapping of fair information practices. Information and Privacy Commissioner of Ontario, Canada (2009)"},{"issue":"2","key":"22_CR12","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/s12394-010-0053-z","volume":"3","author":"A Cavoukian","year":"2010","unstructured":"Cavoukian, A., Taylor, S., Abrams, M.E.: Privacy by design: essential for organizational accountability and strong business practices. Identity Inf. Soc. 3(2), 405\u2013413 (2010)","journal-title":"Identity Inf. Soc."},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Colesky, M., Hoepman, J.H., Hillen, C.: A critical analysis of privacy design strategies. In: 2016 IEEE Security and Privacy Workshops (SPW), pp. 33\u201340 (2016)","DOI":"10.1109\/SPW.2016.23"},{"key":"22_CR14","unstructured":"Colesky, M., Hoepman, J.H., B\u00f6sch, C., Kargl, F., Kopp, H., Mosby, P., Le M\u00e9tayer, D., Drozd, O., del \u00c1lamo, J.M., Mart\u00edn, Y.S., Gupta, M., Doty, N.: Privacy patterns (2012). https:\/\/privacypatterns.org\/"},{"key":"22_CR15","unstructured":"Emmanouel, A.: Look at the frontal side of life: anterior brain pathology and everyday executive function: assessment approaches and treatment. Ph.D. thesis, Radboud University (2017). http:\/\/repository.ubn.ru.nl\/handle\/2066\/166754"},{"key":"22_CR16","unstructured":"Charter of fundamental rights of the European union (2012\/C 326\/02)"},{"key":"22_CR17","unstructured":"Regulation (EU) 2016\/679 of the European parliament and of the council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/46\/EC (general data protection regulation). Official Journal of the European Union L119, pp. 1\u201388, May 2016. http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=OJ:L:2016:119:TOC"},{"key":"22_CR18","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-94-007-5170-5_1","volume-title":"European Data Protection: Coming of Age","author":"RL Finn","year":"2013","unstructured":"Finn, R.L., Wright, D., Friedewald, M.: Seven types of privacy. In: Gutwirth, S., Leenes, R., de Hert, P., Poullet, Y. (eds.) European Data Protection: Coming of Age, pp. 3\u201332. Springer, Dordrecht (2013). https:\/\/doi.org\/10.1007\/978-94-007-5170-5_1"},{"issue":"4","key":"22_CR19","doi-asserted-by":"publisher","first-page":"e102","DOI":"10.2196\/jmir.2923","volume":"16","author":"P Gamito","year":"2014","unstructured":"Gamito, P., Oliveira, J., Lopes, P., Brito, R., Morais, D., Silva, D., Silva, A., Rebelo, S., Bastos, M., Deus, A.: Executive functioning in alcoholics following an mHealth cognitive stimulation program: randomized controlled trial. J. Med. Internet Res. 16(4), e102 (2014). http:\/\/www.jmir.org\/2014\/4\/e102\/","journal-title":"J. Med. Internet Res."},{"issue":"7","key":"22_CR20","first-page":"769","volume":"43","author":"M Hafiz","year":"2013","unstructured":"Hafiz, M.: A pattern language for developing privacy enhancing technologies. Softw.: Pract. Exp. 43(7), 769\u2013787 (2013)","journal-title":"Softw.: Pract. Exp."},{"key":"22_CR21","doi-asserted-by":"publisher","unstructured":"Hafiz, M., Adamczyk, P., Johnson, R.E.: Growing a pattern language (for security). In: Proceedings of the ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software, pp. 139\u2013158. ACM, New York (2012). https:\/\/doi.org\/10.1145\/2384592.2384607","DOI":"10.1145\/2384592.2384607"},{"key":"22_CR22","doi-asserted-by":"crossref","unstructured":"Hansen, M., Jensen, M., Rost, M.: Protection goals for privacy engineering. In: 2015 IEEE Security and Privacy Workshops, pp. 159\u2013166, May 2015","DOI":"10.1109\/SPW.2015.13"},{"key":"22_CR23","unstructured":"Hansen, M.: The standard data protection model - a concept for inspection and consultation on the basis of unified protection goals, March 2017. https:\/\/www.datenschutzzentrum.de\/uploads\/sdm\/SDM-Methodology_V1_EN1.pdf"},{"key":"22_CR24","doi-asserted-by":"crossref","unstructured":"Hillen, C.: The pseudonym broker privacy pattern in medical data collection. In: 2015 IEEE Trustcom\/BigDataSE\/ISPA, vol. 1, pp. 999\u20131005, August 2015","DOI":"10.1109\/Trustcom.2015.475"},{"key":"22_CR25","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1007\/978-3-642-55415-5_38","volume-title":"ICT Systems Security and Privacy Protection","author":"J-H Hoepman","year":"2014","unstructured":"Hoepman, J.-H.: Privacy design strategies. In: Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Abou El Kalam, A., Sans, T. (eds.) SEC 2014. IAICT, vol. 428, pp. 446\u2013459. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-55415-5_38"},{"key":"22_CR26","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1186\/s12916-015-0444-y","volume":"13","author":"K Huckvale","year":"2015","unstructured":"Huckvale, K., Prieto, J.T., Tilney, M., Benghozi, P.J., Car, J.: Unaddressed privacy risks in accredited health and wellness apps: a cross-sectional systematic assessment. BMC Med. 13, 214 (2015). https:\/\/doi.org\/10.1186\/s12916-015-0444-y","journal-title":"BMC Med."},{"key":"22_CR27","unstructured":"Hundepool, A., Domingo-Ferrer, J., Franconi, L., Giessing, S., Lenz, R., Longhurst, J., Nordholt, E.S., Seri, G., Wolf, P.: Handbook on statistical disclosure control. ESSnet on Statistical Disclosure Control (2010)"},{"issue":"3","key":"22_CR28","doi-asserted-by":"publisher","first-page":"1169","DOI":"10.3233\/JAD-160545","volume":"54","author":"A Jenkins","year":"2016","unstructured":"Jenkins, A., Lindsay, S., Eslambolchilar, P., Thornton, I.M., Tales, A.: Administering cognitive tests through touch screen tablet devices: potential issues. J. Alzheimers Dis. 54(3), 1169\u20131182 (2016)","journal-title":"J. Alzheimers Dis."},{"issue":"3","key":"22_CR29","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s00766-008-0067-3","volume":"13","author":"C Kalloniatis","year":"2008","unstructured":"Kalloniatis, C., Kavakli, E., Gritzalis, S.: Addressing privacy requirements in system design: the PriS method. Requir. Eng. 13(3), 241\u2013255 (2008). https:\/\/doi.org\/10.1007\/s00766-008-0067-3","journal-title":"Requir. Eng."},{"issue":"5S","key":"22_CR30","doi-asserted-by":"publisher","first-page":"S106","DOI":"10.1016\/j.pmrj.2017.02.018","volume":"9","author":"CK Kao","year":"2017","unstructured":"Kao, C.K., Liebovitz, D.M.: Consumer mobile health apps: current state, barriers, and future directions. PM & R: J. Inj. Funct. Rehabil. 9(5S), S106\u2013S115 (2017)","journal-title":"PM & R: J. Inj. Funct. Rehabil."},{"issue":"4","key":"22_CR31","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1093\/idpl\/ipt017","volume":"3","author":"J Kokott","year":"2013","unstructured":"Kokott, J., Sobotta, C.: The distinction between privacy and data protection in the jurisprudence of the CJEU and the ECtHR. Int. Data Priv. Law 3(4), 222\u2013228 (2013). https:\/\/doi.org\/10.1093\/idpl\/ipt017","journal-title":"Int. Data Priv. Law"},{"issue":"1","key":"22_CR32","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MC.2012.392","volume":"46","author":"S Kumar","year":"2013","unstructured":"Kumar, S., Nilsen, W., Pavel, M., Srivastava, M.: Mobile health: revolutionizing healthcare through transdisciplinary research. Computer 46(1), 28\u201335 (2013)","journal-title":"Computer"},{"key":"22_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/3-540-45427-6_23","volume-title":"Ubicomp 2001: Ubiquitous Computing","author":"M Langheinrich","year":"2001","unstructured":"Langheinrich, M.: Privacy by design \u2014 principles of privacy-aware ubiquitous systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 273\u2013291. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45427-6_23"},{"key":"22_CR34","doi-asserted-by":"crossref","unstructured":"Lenhard, J., Fritsch, L., Herold, S.: A literature study on privacy patterns research. In: 3rd Euromicro Conference on Software Engineering and Advanced Applications (SEAA), Vienna, Austria, August 2017","DOI":"10.1109\/SEAA.2017.28"},{"issue":"3","key":"22_CR35","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1017\/S1355617700633052","volume":"6","author":"B Levine","year":"2000","unstructured":"Levine, B., Robertson, I.H., Clare, L., Carter, G., Hong, J., Wilson, B.A., Duncan, J., Stuss, D.T.: Rehabilitation of executive functioning: an experimental-clinical validation of goal management training. J. Int. Neuropsychol. Soc. 6(3), 299\u2013312 (2000)","journal-title":"J. Int. Neuropsychol. Soc."},{"issue":"1","key":"22_CR36","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/j.cels.2015.05.001","volume":"1","author":"KD Mandl","year":"2015","unstructured":"Mandl, K.D., Mandel, J.C., Kohane, I.S.: Driving innovation in health systems through an apps-based information economy. Cell Syst. 1(1), 8\u201313 (2015)","journal-title":"Cell Syst."},{"issue":"1","key":"22_CR37","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1177\/1357633X16673538","volume":"24","author":"FH McKay","year":"2016","unstructured":"McKay, F.H., Cheng, C., Wright, A., Shill, J., Stephens, H., Uccellini, M.: Evaluating mobile phone applications for health behaviour change: a systematic review. J. Telemed. Telecare 24(1), 22\u201330 (2016). https:\/\/doi.org\/10.1177\/1357633X16673538","journal-title":"J. Telemed. Telecare"},{"key":"22_CR38","unstructured":"heise online: Abgegriffene Browserdaten: WOT-Anbieter will Datenschutz-Vorw\u00fcrfe pr\u00fcfen, November 2016. https:\/\/www.heise.de\/ho\/meldung\/Abgegriffene-Browserdaten-WOT-Anbieter-will-Datenschutz-Vorwuerfe-pruefen-3455466.html"},{"key":"22_CR39","unstructured":"heise online: Daten zu Surfverhalten von Millionen Deutschen als \u201ckostenlose Probe\u201d, November 2016. https:\/\/www.heise.de\/ho\/meldung\/Daten-zu-Surfverhalten-von-Millionen-Deutschen-als-kostenlose-Probe-3451556.html"},{"key":"22_CR40","doi-asserted-by":"publisher","first-page":"1158","DOI":"10.1186\/s12889-016-3808-0","volume":"16","author":"W Peng","year":"2016","unstructured":"Peng, W., Kanthawala, S., Yuan, S., Hussain, S.A.: A qualitative study of user perceptions of mobile health apps. BMC Public Health 16, 1158 (2016). https:\/\/doi.org\/10.1186\/s12889-016-3808-0","journal-title":"BMC Public Health"},{"key":"22_CR41","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1186\/1471-2261-12-36","volume":"12","author":"L Pfaeffli","year":"2012","unstructured":"Pfaeffli, L., Maddison, R., Whittaker, R., Stewart, R., Kerr, A., Jiang, Y., Kira, G., Carter, K., Dalleck, L.: A mHealth cardiac rehabilitation exercise intervention: findings from content development studies. BMC Cardiovasc. Disord. 12, 36 (2012). https:\/\/doi.org\/10.1186\/1471-2261-12-36","journal-title":"BMC Cardiovasc. Disord."},{"key":"22_CR42","doi-asserted-by":"publisher","unstructured":"Prasad, A., Sorber, J., Stablein, T., Anthony, D., Kotz, D.: Understanding sharing preferences and behavior for mHealth devices. In: Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society, WPES 2012, pp. 117\u2013128. ACM, New York (2012). https:\/\/doi.org\/10.1145\/2381966.2381983","DOI":"10.1145\/2381966.2381983"},{"key":"22_CR43","doi-asserted-by":"crossref","unstructured":"Ranchordas, S., Kaplan, B.: MHealth for Alzheimer\u2019s disease: regulation, consent, and privacy concerns. SSRN Scholarly Paper ID 2765976, Social Science Research Network, Rochester, April 2016. https:\/\/papers.ssrn.com\/abstract=2765976","DOI":"10.2139\/ssrn.2765976"},{"key":"22_CR44","doi-asserted-by":"publisher","unstructured":"Siljee, J.: Privacy transparency patterns. In: Proceedings of the 20th European Conference on Pattern Languages of Programs, EuroPLoP 2015, pp. 52:1\u201352:11. ACM, New York (2015). https:\/\/doi.org\/10.1145\/2855321.2855374","DOI":"10.1145\/2855321.2855374"},{"issue":"e1","key":"22_CR45","doi-asserted-by":"crossref","first-page":"e28","DOI":"10.1136\/amiajnl-2013-002605","volume":"22","author":"A Sunyaev","year":"2015","unstructured":"Sunyaev, A., Dehling, T., Taylor, P.L., Mandl, K.D.: Availability and quality of mobile health app privacy policies. J. Am. Med. Inf. Assoc. 22(e1), e28\u2013e33 (2015). https:\/\/academic.oup.com\/jamia\/article\/22\/e1\/e28\/700676\/Availability-and-quality-of-mobile-health-app","journal-title":"J. Am. Med. Inf. Assoc."},{"key":"22_CR46","unstructured":"Tirman, V.J.: The current state of mHealth applications and the need for improved regulatory guidelines to protect the privacy of patient health information. Ph.D. thesis, Alliant International University (2016)"},{"key":"22_CR47","doi-asserted-by":"crossref","unstructured":"Vogel, M.M.E., Combs, S.E., Kessel, K.A.: mHealth and application technology supporting clinical trials: today\u2019s limitations and future perspective of smartRCTs. Front. Oncol. 7 (2017). http:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC5346562\/","DOI":"10.3389\/fonc.2017.00037"},{"issue":"1","key":"22_CR48","doi-asserted-by":"publisher","first-page":"e23","DOI":"10.2196\/mhealth.5219","volume":"4","author":"E Volkova","year":"2016","unstructured":"Volkova, E., Li, N., Dunford, E., Eyles, H., Crino, M., Michie, J., Mhurchu, C.N.: \u201cSmart\u201d RCTs: development of a smartphone app for fully automated nutrition-labeling intervention trials. JMIR mHealth uHealth 4(1), e23 (2016). http:\/\/mhealth.jmir.org\/2016\/1\/e23\/","journal-title":"JMIR mHealth uHealth"},{"key":"22_CR49","doi-asserted-by":"crossref","unstructured":"Vrhovec, S.L.R.: Challenges of mobile device use in healthcare. In: 2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 1393\u20131396, May 2016","DOI":"10.1109\/MIPRO.2016.7522357"},{"issue":"3","key":"22_CR50","doi-asserted-by":"publisher","first-page":"e31","DOI":"10.2196\/mhealth.3136","volume":"2","author":"A Zmily","year":"2014","unstructured":"Zmily, A., Mowafi, Y., Mashal, E.: Study of the usability of spaced retrieval exercise using mobile devices for Alzheimer\u2019s disease rehabilitation. JMIR mHealth uHealth 2(3), e31 (2014). http:\/\/mhealth.jmir.org\/2014\/3\/e31\/","journal-title":"JMIR mHealth uHealth"}],"container-title":["IFIP Advances in Information and Communication Technology","Privacy and Identity Management. The Smart Revolution"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-92925-5_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,8]],"date-time":"2022-06-08T00:09:50Z","timestamp":1654646990000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-92925-5_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319929248","9783319929255"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-92925-5_22","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"9 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Privacy and Identity","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Summer School on Privacy and Identity Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ispra","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 September 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 September 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"privacy-identity2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.ifip-summerschool.org\/ifip-summerschool2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}