{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:44:13Z","timestamp":1742913853156,"version":"3.40.3"},"publisher-location":"Cham","reference-count":44,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319996042"},{"type":"electronic","value":"9783319996059"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-99605-9_15","type":"book-chapter","created":{"date-parts":[[2018,8,25]],"date-time":"2018-08-25T09:35:42Z","timestamp":1535189742000},"page":"202-218","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Aware but not in Control"],"prefix":"10.1007","author":[{"given":"Kathrin","family":"Bednar","sequence":"first","affiliation":[]},{"given":"Sarah","family":"Spiekermann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,26]]},"reference":[{"key":"15_CR1","doi-asserted-by":"publisher","first-page":"2632","DOI":"10.1016\/j.chb.2013.07.003","volume":"29","author":"M Salehan","year":"2013","unstructured":"Salehan, M., Negahban, A.: Social networking on smartphones: when mobile phones become addictive. Comput. Hum. Behav. 29, 2632\u20132639 (2013). https:\/\/doi.org\/10.1016\/j.chb.2013.07.003","journal-title":"Comput. Hum. Behav."},{"key":"15_CR2","unstructured":"ind.ie. https:\/\/ind.ie\/ethical-design\/"},{"key":"15_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68944-9","volume-title":"Slow Tech and ICT: A Responsible, Sustainable and Ethical Approach","author":"N Patrignani","year":"2018","unstructured":"Patrignani, N., Whitehouse, D.: Slow Tech and ICT: A Responsible, Sustainable and Ethical Approach. Palgrave Macmillan, Cham (2018)"},{"key":"15_CR4","volume-title":"Ethical IT Innovation: A Value-Based System Design Approach","author":"S Spiekermann","year":"2016","unstructured":"Spiekermann, S.: Ethical IT Innovation: A Value-Based System Design Approach. CRC Press, Boca Raton (2016)"},{"key":"15_CR5","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1016\/j.eurpsy.2015.04.002","volume":"30","author":"A B\u0142achnio","year":"2015","unstructured":"B\u0142achnio, A., Przepi\u00f3rka, A., Pantic, I.: Internet use, Facebook intrusion, and depression: results of a cross-sectional study. Eur. Psychiatry 30, 681\u2013684 (2015). https:\/\/doi.org\/10.1016\/j.eurpsy.2015.04.002","journal-title":"Eur. Psychiatry"},{"key":"15_CR6","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1177\/0093650203257842","volume":"30","author":"SE Caplan","year":"2003","unstructured":"Caplan, S.E.: Preference for online social interaction: a theory of Problematic Internet Use and psychosocial well-being. Commun. Res. 30, 625\u2013648 (2003). https:\/\/doi.org\/10.1177\/0093650203257842","journal-title":"Commun. Res."},{"key":"15_CR7","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/j.chb.2013.08.007","volume":"30","author":"MZ Yao","year":"2014","unstructured":"Yao, M.Z., Zhong, Z.: Loneliness, social contacts and Internet addiction: a cross-lagged panel study. Comput. Hum. Behav. 30, 164\u2013170 (2014). https:\/\/doi.org\/10.1016\/j.chb.2013.08.007","journal-title":"Comput. Hum. Behav."},{"key":"15_CR8","doi-asserted-by":"publisher","first-page":"959","DOI":"10.1016\/j.chb.2012.12.024","volume":"29","author":"DJ Kuss","year":"2013","unstructured":"Kuss, D.J., Griffiths, M.D., Binder, J.F.: Internet addiction in students: prevalence and risk factors. Comput. Hum. Behav. 29, 959\u2013966 (2013). https:\/\/doi.org\/10.1016\/j.chb.2012.12.024","journal-title":"Comput. Hum. Behav."},{"key":"15_CR9","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.chb.2014.12.053","volume":"46","author":"S Brooks","year":"2015","unstructured":"Brooks, S.: Does personal social media usage affect efficiency and well-being? Comput. Hum. Behav. 46, 26\u201337 (2015). https:\/\/doi.org\/10.1016\/j.chb.2014.12.053","journal-title":"Comput. Hum. Behav."},{"key":"15_CR10","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1080\/00094056.2013.815554","volume":"89","author":"GG Reid","year":"2013","unstructured":"Reid, G.G., Boyer, W.: Social network sites and young adolescent identity development. Child. Educ. 89, 243\u2013253 (2013). https:\/\/doi.org\/10.1080\/00094056.2013.815554","journal-title":"Child. Educ."},{"key":"15_CR11","unstructured":"Barkhordari, R., Willemyns, M.: Young adults\u2019 construction of social identity on Facebook: a structural equation model. In: Proceedings of the 3rd European Conference on Social Media (2016)"},{"key":"15_CR12","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/j.chb.2014.11.006","volume":"43","author":"A Lepp","year":"2015","unstructured":"Lepp, A., Li, J., Barkley, J.E., Salehi-Esfahani, S.: Exploring the relationships between college students\u2019 cell phone use, personality and leisure. Comput. Hum. Behav. 43, 210\u2013219 (2015). https:\/\/doi.org\/10.1016\/j.chb.2014.11.006","journal-title":"Comput. Hum. Behav."},{"key":"15_CR13","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1016\/j.chb.2015.06.021","volume":"52","author":"J Li","year":"2015","unstructured":"Li, J., Lepp, A., Barkley, J.E.: Locus of control and cell phone use: implications for sleep quality, academic performance, and subjective well-being. Comput. Hum. Behav. 52, 450\u2013452 (2015). https:\/\/doi.org\/10.1016\/j.chb.2015.06.021","journal-title":"Comput. Hum. Behav."},{"key":"15_CR14","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1016\/j.chb.2016.05.079","volume":"63","author":"JD Elhai","year":"2016","unstructured":"Elhai, J.D., Levine, J.C., Dvorak, R.D., Hall, B.J.: Fear of missing out, need for touch, anxiety and depression are related to problematic smartphone use. Comput. Hum. Behav. 63, 509\u2013516 (2016). https:\/\/doi.org\/10.1016\/j.chb.2016.05.079","journal-title":"Comput. Hum. Behav."},{"key":"15_CR15","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.childyouth.2014.03.001","volume":"41","author":"P Best","year":"2014","unstructured":"Best, P., Manktelow, R., Taylor, B.: Online communication, social media and adolescent wellbeing: a systematic narrative review. Child Youth Serv. Rev. 41, 27\u201336 (2014). https:\/\/doi.org\/10.1016\/j.childyouth.2014.03.001","journal-title":"Child Youth Serv. Rev."},{"key":"15_CR16","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1108\/09564231311326987","volume":"24","author":"RN Bolton","year":"2013","unstructured":"Bolton, R.N., et al.: Understanding Generation Y and their use of social media: a review and research agenda. J. Serv. Manag. 24, 245\u2013267 (2013). https:\/\/doi.org\/10.1108\/09564231311326987","journal-title":"J. Serv. Manag."},{"key":"15_CR17","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.ijinfomgt.2014.09.004","volume":"35","author":"EWT Ngai","year":"2015","unstructured":"Ngai, E.W.T., Tao, S.S.C., Moon, K.K.L.: Social media research: theories, constructs, and conceptual frameworks. Int. J. Inf. Manage. 35, 33\u201344 (2015). https:\/\/doi.org\/10.1016\/j.ijinfomgt.2014.09.004","journal-title":"Int. J. Inf. Manage."},{"key":"15_CR18","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.socec.2013.08.004","volume":"46","author":"T P\u00e9nard","year":"2013","unstructured":"P\u00e9nard, T., Poussing, N., Suire, R.: Does the Internet make people happier? J. Soc. Econ. 46, 105\u2013116 (2013). https:\/\/doi.org\/10.1016\/j.socec.2013.08.004","journal-title":"J. Soc. Econ."},{"key":"15_CR19","doi-asserted-by":"publisher","first-page":"887","DOI":"10.1287\/orsc.1100.0573","volume":"22","author":"SR Barley","year":"2011","unstructured":"Barley, S.R., Meyerson, D.E., Grodal, S.: E-mail as a source and symbol of stress. Organ. Sci. 22, 887\u2013906 (2011). https:\/\/doi.org\/10.1287\/orsc.1100.0573","journal-title":"Organ. Sci."},{"key":"15_CR20","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/j.chb.2013.10.059","volume":"31","author":"D Kardefelt-Winther","year":"2014","unstructured":"Kardefelt-Winther, D.: A conceptual and methodological critique of internet addiction research: towards a model of compensatory internet use. Comput. Hum. Behav. 31, 351\u2013354 (2014). https:\/\/doi.org\/10.1016\/j.chb.2013.10.059","journal-title":"Comput. Hum. Behav."},{"key":"15_CR21","first-page":"348","volume-title":"Human-Computer Interaction and Management Information Systems: Foundations","author":"B Friedman","year":"2006","unstructured":"Friedman, B., Kahn Jr., P.H., Borning, A.: Value sensitive design and information systems. In: Zhang, P., Galletta, D. (eds.) Human-Computer Interaction and Management Information Systems: Foundations, pp. 348\u2013372. M.E.Sharpe, Armonk (2006)"},{"key":"15_CR22","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1016\/j.chb.2013.10.049","volume":"31","author":"A Lepp","year":"2014","unstructured":"Lepp, A., Barkley, J.E., Karpinski, A.C.: The relationship between cell phone use, academic performance, anxiety, and Satisfaction with Life in college students. Comput. Hum. Behav. 31, 343\u2013350 (2014). https:\/\/doi.org\/10.1016\/j.chb.2013.10.049","journal-title":"Comput. Hum. Behav."},{"key":"15_CR23","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1093\/aje\/kww189","volume":"185","author":"HB Shakya","year":"2017","unstructured":"Shakya, H.B., Christakis, N.A.: Association of Facebook use with compromised well-being: a longitudinal study. Am. J. Epidemiol. 185, 203\u2013211 (2017). https:\/\/doi.org\/10.1093\/aje\/kww189","journal-title":"Am. J. Epidemiol."},{"key":"15_CR24","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.joep.2017.09.001","volume":"63","author":"V Rotondi","year":"2017","unstructured":"Rotondi, V., Stanca, L., Tomasuolo, M.: Connecting alone: smartphone use, quality of social interactions and well-being. J. Econ. Psychol. 63, 17\u201326 (2017). https:\/\/doi.org\/10.1016\/j.joep.2017.09.001","journal-title":"J. Econ. Psychol."},{"key":"15_CR25","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1002\/da.22466.Association","volume":"33","author":"LY Lin","year":"2016","unstructured":"Lin, L.Y., et al.: Association between social media use and depression among U.S. young adults. Depress. Anxiety 33, 323\u2013331 (2016). https:\/\/doi.org\/10.1002\/da.22466.Association","journal-title":"Depress. Anxiety"},{"key":"15_CR26","doi-asserted-by":"publisher","unstructured":"Primack, B.A., et al.: Use of multiple social media platforms and symptoms of depression and anxiety: a nationally-representative study among U.S. young adults. Comput. Hum. Behav. 69, 1\u20139 (2017). https:\/\/doi.org\/10.1016\/j.chb.2016.11.013","DOI":"10.1016\/j.chb.2016.11.013"},{"key":"15_CR27","doi-asserted-by":"publisher","first-page":"1051","DOI":"10.1016\/j.sbspro.2011.10.205","volume":"30","author":"G Craparo","year":"2011","unstructured":"Craparo, G.: Internet addiction, dissociation, and alexithymia. Proc. Soc. Behav. Sci. 30, 1051\u20131056 (2011). https:\/\/doi.org\/10.1016\/j.sbspro.2011.10.205","journal-title":"Proc. Soc. Behav. Sci."},{"key":"15_CR28","doi-asserted-by":"publisher","first-page":"728","DOI":"10.1097\/01.nmd.0000185891.13719.54","volume":"193","author":"C-H Ko","year":"2005","unstructured":"Ko, C.-H., Yen, J.-Y., Chen, C.-C., Chen, S.-H., Yen, C.-F.: Proposed diagnostic criteria of Internet addiction for adolescents. J. Nerv. Ment. Dis. 193, 728\u2013733 (2005). https:\/\/doi.org\/10.1097\/01.nmd.0000185891.13719.54","journal-title":"J. Nerv. Ment. Dis."},{"key":"15_CR29","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/s40429-015-0054-y","volume":"2","author":"J Billieux","year":"2015","unstructured":"Billieux, J., Maurage, P., Lopez-Fernandez, O., Kuss, D.J., Griffiths, M.D.: Can disordered mobile phone use be considered a behavioral addiction? An update on current evidence and a comprehensive model for future research. Curr. Addict. Rep. 2, 156\u2013162 (2015). https:\/\/doi.org\/10.1007\/s40429-015-0054-y","journal-title":"Curr. Addict. Rep."},{"key":"15_CR30","doi-asserted-by":"publisher","first-page":"e56936","DOI":"10.1371\/journal.pone.0056936","volume":"8","author":"M Kwon","year":"2013","unstructured":"Kwon, M., et al.: Development and validation of a Smartphone Addiction Scale (SAS). PLoS ONE 8, e56936 (2013). https:\/\/doi.org\/10.1371\/journal.pone.0056936","journal-title":"PLoS ONE"},{"key":"15_CR31","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/S0747-5632(00)00041-8","volume":"17","author":"RA Davis","year":"2001","unstructured":"Davis, R.A.: Cognitive-behavioral model of pathological Internet use. Comput. Hum. Behav. 17, 187\u2013195 (2001). https:\/\/doi.org\/10.1016\/S0747-5632(00)00041-8","journal-title":"Comput. Hum. Behav."},{"key":"15_CR32","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1177\/0093650210377196","volume":"38","author":"C Shen","year":"2011","unstructured":"Shen, C., Williams, D.: Unpacking time online: connecting internet and massively multiplayer online game use with psychosocial well-being. Commun. Res. 38, 123\u2013149 (2011). https:\/\/doi.org\/10.1177\/0093650210377196","journal-title":"Commun. Res."},{"key":"15_CR33","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1111\/j.1540-4560.1994.tb01196.x","volume":"50","author":"SH Schwartz","year":"1994","unstructured":"Schwartz, S.H.: Are there universal aspects in the structure and contents of human values? J. Soc. Issues 50, 19\u201345 (1994). https:\/\/doi.org\/10.1111\/j.1540-4560.1994.tb01196.x","journal-title":"J. Soc. Issues"},{"key":"15_CR34","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1037\/h0054346","volume":"50","author":"AH Maslow","year":"1943","unstructured":"Maslow, A.H.: A theory of human motivation. Psychol. Rev. 50, 370\u2013396 (1943). https:\/\/doi.org\/10.1037\/h0054346","journal-title":"Psychol. Rev."},{"key":"15_CR35","volume-title":"Werte: Ein Streifzug durch Philosophie und Wissenschaft","author":"HT Krobath","year":"2009","unstructured":"Krobath, H.T.: Werte: Ein Streifzug durch Philosophie und Wissenschaft. K\u00f6nigshausen & Neumann, W\u00fcrzburg (2009)"},{"key":"15_CR36","unstructured":"Frankena, W.K.: Ethics. Prentice-Hall, Inc., Englewood Cliffs (1973)"},{"key":"15_CR37","volume-title":"Formalism in Ethics and Non-Formal Ethics of Values: A New Attempt Toward the Foundation of An Ethical Personalism","author":"M Scheler","year":"1973","unstructured":"Scheler, M.: Formalism in Ethics and Non-Formal Ethics of Values: A New Attempt Toward the Foundation of An Ethical Personalism. Northwestern University Press, Evanston (1973)"},{"key":"15_CR38","unstructured":"Alter, A.: How Technology Gets us Hooked (2017). https:\/\/www.theguardian.com\/technology\/2017\/feb\/28\/how-technology-gets-us-hooked"},{"key":"15_CR39","volume-title":"Hooked: How to Build Habit-Forming Products","author":"N Eyal","year":"2014","unstructured":"Eyal, N., Hoover, R.: Hooked: How to Build Habit-Forming Products. Portfolio Penguin, London (2014)"},{"key":"15_CR40","volume-title":"Motivation and Personality","author":"AH Maslow","year":"1970","unstructured":"Maslow, A.H.: Motivation and Personality. Harper & Row, New York (1970)"},{"key":"15_CR41","unstructured":"Eurostat: Internet Access and Use Statistics - Households and Individuals. http:\/\/ec.europa.eu\/eurostat\/statistics-explained\/index.php\/Internet_access_and_use_statistics_-_households_and_individuals"},{"key":"15_CR42","doi-asserted-by":"crossref","unstructured":"Mayring, P.: Qualitative content analysis: theoretical foundation, basic procedures and software solution (2014)","DOI":"10.1007\/978-94-017-9181-6_13"},{"key":"15_CR43","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1080\/0144929X.2016.1159249","volume":"36","author":"E Mazzoni","year":"2017","unstructured":"Mazzoni, E., Cannata, D., Baiocco, L.: Focused, not lost: the mediating role of temporal dissociation and focused immersion on problematic internet use. Behav. Inf. Technol. 36, 11\u201320 (2017). https:\/\/doi.org\/10.1080\/0144929X.2016.1159249","journal-title":"Behav. Inf. Technol."},{"key":"15_CR44","doi-asserted-by":"publisher","first-page":"1841","DOI":"10.1016\/j.chb.2013.02.014","volume":"29","author":"AK Przybylski","year":"2013","unstructured":"Przybylski, A.K., Murayama, K., Dehaan, C.R., Gladwell, V.: Motivational, emotional, and behavioral correlates of Fear of Missing Out. Comput. Hum. Behav. 29, 1841\u20131848 (2013). https:\/\/doi.org\/10.1016\/j.chb.2013.02.014","journal-title":"Comput. Hum. Behav."}],"container-title":["IFIP Advances in Information and Communication Technology","This Changes Everything \u2013 ICT and Climate Change: What Can We Do?"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-99605-9_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,10]],"date-time":"2022-09-10T00:06:23Z","timestamp":1662768383000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-99605-9_15"}},"subtitle":["A Qualitative Value Analysis of the Effects of New Technologies"],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319996042","9783319996059"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-99605-9_15","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"26 August 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCC13","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Human Choice and Computers","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poznan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/hcc13.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"OCS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"60% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.27","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1.9","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}