{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T21:18:43Z","timestamp":1767907123190,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":51,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819970315","type":"print"},{"value":"9789819970322","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-7032-2_6","type":"book-chapter","created":{"date-parts":[[2023,11,7]],"date-time":"2023-11-07T23:02:49Z","timestamp":1699398169000},"page":"91-104","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Cross-Border Data Security from the Perspective of Risk Assessment"],"prefix":"10.1007","author":[{"given":"Na","family":"Wang","sequence":"first","affiliation":[]},{"given":"Gaofei","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Jingfeng","family":"Rong","sequence":"additional","affiliation":[]},{"given":"Zheng","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Qiuling","family":"Yue","sequence":"additional","affiliation":[]},{"given":"Jinglu","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Yuqing","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,8]]},"reference":[{"key":"6_CR1","unstructured":"Ran, C., He, M., Liu, X.: Research on governance and countermeasures of cross border data flow in china from the perspective of data sovereignty. Libr. Intell. (4), 1\u201314 (2021)"},{"key":"6_CR2","unstructured":"Lun, Y.: Practice and enlightenment of cross-border data flow in Australia. Inf. Secur. Commun. Confidentiality (05), 25\u201332 (2017)"},{"issue":"2","key":"6_CR3","doi-asserted-by":"publisher","first-page":"21","DOI":"10.17323\/2713-2749.2021.2.21.48","volume":"2","author":"E Mazetova","year":"2021","unstructured":"Mazetova, E.: Data protection regulation and international arbitration: can there be harmonious coexistence (with the GDPR requirements concerning cross-border data transfer)? Legal Issues Digit. Age 2(2), 21\u201348 (2021)","journal-title":"Legal Issues Digit. Age"},{"key":"6_CR4","unstructured":"Zhao, W.: Regulation of cross-border flow of personal data. Master\u2019s degree thesis. Dalian Maritime University, Liaoning (2019)"},{"key":"6_CR5","unstructured":"Fan, S.: Personal data protection in cross-border data flow. Electron. Intellect. Prop. Rights (6), 85\u201397 (2020)"},{"key":"6_CR6","first-page":"1","volume":"19","author":"BS Jimenez-Gomez","year":"2021","unstructured":"Jimenez-Gomez, B.S.: Cross-border data transfers between the EU and the US: a transatlantic dispute. Santa Clara J. Int. L. 19, 1 (2021)","journal-title":"Santa Clara J. Int. L."},{"key":"6_CR7","doi-asserted-by":"publisher","unstructured":"Rahat, T.A., Long, M., Tian, Y.: Is your policy compliant? A deep learning-based empirical study of privacy policies\u2019 compliance with GDPR. In: Proceedings of the 21st Workshop on Privacy in the Electronic Society (WPES 2022), pp. 89\u2013102. Association for Computing Machinery, New York (2022). https:\/\/doi.org\/10.1145\/3559613.3563195","DOI":"10.1145\/3559613.3563195"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Story, P., Zimmeck, S., Ravichander, A., et al.: Natural language processing for mobile app privacy compliance. In: AAAI Spring Symposium on Privacy-Enhancing Artificial Intelligence and Language Technologies, p. 10 (2019)","DOI":"10.2478\/popets-2019-0037"},{"key":"6_CR9","doi-asserted-by":"publisher","unstructured":"Asif, M., Javed, Y., Hussain, M.: Automated analysis of Pakistani websites\u2019 compliance with GDPR and Pakistan data protection act. In: 2021 International Conference on Frontiers of Information Technology (FIT), pp. 234\u2013239 (2021). https:\/\/doi.org\/10.1109\/FIT53504.2021.00051","DOI":"10.1109\/FIT53504.2021.00051"},{"key":"6_CR10","doi-asserted-by":"publisher","unstructured":"Liu, S., Zhao, B., Guo, R., Meng, G., Zhang, F., Zhang, M.: Have you been properly notified? Automatic compliance analysis of privacy policy text with GDPR Article 13. In Proceedings of the Web Conference 2021 (WWW 2021), pp. 2154\u20132164. Association for Computing Machinery, New York (2021). https:\/\/doi.org\/10.1145\/3442381.3450022","DOI":"10.1145\/3442381.3450022"},{"key":"6_CR11","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-73959-1_1","volume-title":"TAILOR 2020","author":"T Libal","year":"2021","unstructured":"Libal, T.: Towards automated GDPR compliance checking. In: Heintz, F., Milano, M., O\u2019Sullivan, B. (eds.) TAILOR 2020. LNCS, vol. 12641, pp. 3\u201319. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-73959-1_1"},{"issue":"3","key":"6_CR12","first-page":"66","volume":"2019","author":"S Zimmeck","year":"2019","unstructured":"Zimmeck, S., Story, P., Smullen, D., et al.: MAPS: scaling privacy compliance analysis to a million apps. Proc. Priv. Enhanc. Technol. 2019(3), 66\u201386 (2019)","journal-title":"Proc. Priv. Enhanc. Technol."},{"key":"6_CR13","unstructured":"Andow, B., Mahmud, S.Y., Whitaker, J., et al.: Actions speak louder than words: {entity-sensitive} privacy policy and data flow analysis with {PoliCheck}. In: 29th USENIX Security Symposium (USENIX Security 2020), pp. 985\u20131002 (2020)"},{"key":"6_CR14","doi-asserted-by":"publisher","first-page":"15961","DOI":"10.1109\/ACCESS.2021.3053130","volume":"9","author":"DS Guam\u00e1n","year":"2021","unstructured":"Guam\u00e1n, D.S., Del Alamo, J.M., Caiza, J.C.: GDPR compliance assessment for cross-border personal data transfers in android apps. IEEE Access 9, 15961\u201315982 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3053130","journal-title":"IEEE Access"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Guam\u00e1n, D.S., Ferrer, X., del Alamo, J.M., et al.: Automating the GDPR compliance assessment for cross-border personal data transfers in android applications. arXiv preprint arXiv:2103.07297 (2021)","DOI":"10.1109\/ACCESS.2021.3053130"},{"issue":"3","key":"6_CR16","doi-asserted-by":"publisher","first-page":"121","DOI":"10.3969\/j.issn.1008-0821.2022.03.014","volume":"42","author":"H Yuan","year":"2022","unstructured":"Yuan, H., Zhang, S.: Content analysis of privacy policy of government APP under the environment of \u201cinternet plus+government services.\u201d Mod. Intell. 42(3), 121\u2013132 (2022). https:\/\/doi.org\/10.3969\/j.issn.1008-0821.2022.03.014","journal-title":"Mod. Intell."},{"key":"6_CR17","doi-asserted-by":"publisher","first-page":"27","DOI":"10.3969\/j.issn.1004-9517.2021.01.004","volume":"1","author":"C Ma","year":"2021","unstructured":"Ma, C., Liu, Q.: Comparative study on the protection of personal health information between China and the United States: analysis of privacy policy based on 60 mainstream mobile medical APPs. Electron. Intellect. Prop. 1, 27\u201336 (2021). https:\/\/doi.org\/10.3969\/j.issn.1004-9517.2021.01.004","journal-title":"Electron. Intellect. Prop."},{"issue":"4","key":"6_CR18","doi-asserted-by":"publisher","first-page":"101","DOI":"10.3969\/j.issn.1008-0821.2020.04.012","volume":"40","author":"J Zhao","year":"2020","unstructured":"Zhao, J., Yuan, Q., Chen, J.: Research on B2C network merchant privacy policy based on content analysis. Mod. Intell. 40(4), 101\u2013110 (2020). https:\/\/doi.org\/10.3969\/j.issn.1008-0821.2020.04.012","journal-title":"Mod. Intell."},{"issue":"1","key":"6_CR19","doi-asserted-by":"publisher","first-page":"167","DOI":"10.3969\/j.issn.1008-0821.2022.01.016","volume":"42","author":"Y Zhang","year":"2022","unstructured":"Zhang, Y., Qiu, Y.: Research on the compliance of privacy policy of mobile reading APP in China under hard rules. Mod. Intell. 42(1), 167\u2013176 (2022). https:\/\/doi.org\/10.3969\/j.issn.1008-0821.2022.01.016","journal-title":"Mod. Intell."},{"issue":"5","key":"6_CR20","doi-asserted-by":"publisher","first-page":"112","DOI":"10.11925\/infotech.2096-3467.2021.0897","volume":"6","author":"Y Zhao","year":"2022","unstructured":"Zhao, Y., Yan, Z., Shen, Q., et al.: Research on the compliance of privacy policy of medical health APP based on machine learning. Data Anal. Knowl. Discov. 6(5), 112\u2013126 (2022). https:\/\/doi.org\/10.11925\/infotech.2096-3467.2021.0897","journal-title":"Data Anal. Knowl. Discov."},{"key":"6_CR21","doi-asserted-by":"publisher","unstructured":"Liang, D.: The normative path for the protection of personal information of E-commerce consumers: an empirical study based on the privacy policy of 6 categories and 12 home appliance business platforms. J. Dalian Univ. Technol. (Soc. Sci. Edn.) 43(3), 102\u2013112 (2022). https:\/\/doi.org\/10.19525\/j.issn1008-407x.2022.03.011","DOI":"10.19525\/j.issn1008-407x.2022.03.011"},{"key":"6_CR22","doi-asserted-by":"publisher","unstructured":"Wang, X.: Research on compliance of privacy policy in mobile social APP - content analysis based on 20 privacy policy texts. Netw. Secur. Technol. Appl. (1), 143\u2013146 (2022). https:\/\/doi.org\/10.3969\/j.issn.1009-6833.2022.01.090","DOI":"10.3969\/j.issn.1009-6833.2022.01.090"},{"issue":"11","key":"6_CR23","doi-asserted-by":"publisher","first-page":"2749","DOI":"10.3969\/j.issn.1002-0802.2020.11.022","volume":"53","author":"Z Zhu","year":"2020","unstructured":"Zhu, Z., Lu, Y., Tang, Z., et al.: Application classification based on privacy policy terms and machine learning. Commun. Technol. 53(11), 2749\u20132757 (2020). https:\/\/doi.org\/10.3969\/j.issn.1002-0802.2020.11.022","journal-title":"Commun. Technol."},{"key":"6_CR24","unstructured":"Xu, Q.: Research on compliance with privacy policy of mobile internet APP based on the personal information protection law. Wuhan University, Hubei (2022)"},{"issue":"9","key":"6_CR25","first-page":"2347","volume":"42","author":"J Li","year":"2022","unstructured":"Li, J., Zhang, L., Li, J., Xing, X.: Classified control and influencing factors for risks management in institutions with cross-border data flow. J. Syst. Sci. Math. Sci. 42(9), 2347\u20132366 (2022)","journal-title":"J. Syst. Sci. Math. Sci."},{"issue":"1","key":"6_CR26","doi-asserted-by":"publisher","first-page":"77","DOI":"10.54648\/COLA2023004","volume":"60","author":"C Kuner","year":"2023","unstructured":"Kuner, C.: Protecting EU data outside EU borders under the GDPR. Common Mark. Law Rev. 60(1), 77\u2013106 (2023)","journal-title":"Common Mark. Law Rev."},{"key":"6_CR27","unstructured":"Du, S.: The enlightenment of EU legislation on cross-border flow of personal data to China. Master\u2019s degree thesis. Shandong University, Shandong (2018)"},{"key":"6_CR28","unstructured":"Li, S.: Research on information security risk assessment method based on improved neural network. China University of Mining and Technology (2018)"},{"key":"6_CR29","unstructured":"Iso, A.N.: AS_NZS ISO 31000:2009 risk management - principles and guidelines (2009)"},{"issue":"6","key":"6_CR30","doi-asserted-by":"publisher","first-page":"881","DOI":"10.1111\/j.1539-6924.2010.01442.x","volume":"30","author":"G Purdy","year":"2010","unstructured":"Purdy, G.: ISO 31000:2009\u2014setting a new standard for risk management. Risk Anal. 30(6), 881\u2013886 (2010)","journal-title":"Risk Anal."},{"issue":"3","key":"6_CR31","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1093\/idpl\/ipac011","volume":"12","author":"R Becker","year":"2022","unstructured":"Becker, R., Thorogood, A., Bovenberg, J., et al.: Applying GDPR roles and responsibilities to scientific data sharing. Int. Data Priv. Law 12(3), 207\u2013219 (2022)","journal-title":"Int. Data Priv. Law"},{"key":"6_CR32","unstructured":"Dang, D., Meng, Z.: Information security risk assessment based on support vector machine. J. Huazhong Univ. Sci. Technol. (Nat. Sci. Edn.) 38(03), 46\u201349 (2010)"},{"issue":"05","key":"6_CR33","first-page":"93","volume":"46","author":"Z Tao","year":"2010","unstructured":"Tao, Z., Mu, D., Ren, S., Yao, L.: An information security risk assessment model based on risk matrix method. Comput. Eng. Appl. 46(05), 93\u201395 (2010)","journal-title":"Comput. Eng. Appl."},{"key":"6_CR34","unstructured":"Xiao, L., Qi, Y., Li, Q.: Information security risk assessment based on AHP and fuzzy comprehensive evaluation. Comput. Eng. Appl. 45(22), 82\u201385 + 89 (2009)"},{"key":"6_CR35","unstructured":"Zhao, D., Liu, H., Liu, C.: Information security risk assessment based on BP neural network. Comput. Eng. Appl. (01), 139\u2013141 (2007)"},{"key":"6_CR36","unstructured":"Fu, Y., Wu, X., Yan, C.: Information security risk assessment method based on Bayesian network. J. Wuhan Univ. (Sci. Edn.) (05), 631\u2013634 (2006)"},{"key":"6_CR37","doi-asserted-by":"crossref","unstructured":"Banton, M., Bowles, J., Silvina, A., et al.: On the benefits and security risks of a user-centric data sharing platform for healthcare provision. In: Adjunct Proceedings of the 29th ACM Conference on User Modeling, Adaptation and Personalization, pp. 351\u2013356 (2021)","DOI":"10.1145\/3450614.3464473"},{"key":"6_CR38","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-981-19-0523-0_21","volume-title":"Frontiers in Cyber Security","author":"W Na","year":"2022","unstructured":"Na, W., Gaofei, W., Qiuling, Y., Jinglu, H., Zhang, Y.: Research on security assessment of cross border data flow. In: Cao, C., Zhang, Y., Hong, Y., Wang, D. (eds.) FCS 2021. CCIS, vol. 1558, pp. 327\u2013341. Springer, Singapore (2022). https:\/\/doi.org\/10.1007\/978-981-19-0523-0_21"},{"issue":"6","key":"6_CR39","first-page":"488","volume":"7","author":"W Na","year":"2021","unstructured":"Na, W., Gu, M., Wu, G., et al.: The current situation, analysis, and prospects of cross border data flow. Inf. Secur. Res. 7(6), 488\u2013495 (2021)","journal-title":"Inf. Secur. Res."},{"key":"6_CR40","doi-asserted-by":"crossref","unstructured":"Parretti, C., Pourabbas, E., Rolli, F., et al.: Robust privacy assessment in transnational healthcare systems. In: IOP Conference Series: Materials Science and Engineering, vol. 1174, no. 1, p. 012015. IOP Publishing (2021)","DOI":"10.1088\/1757-899X\/1174\/1\/012015"},{"key":"6_CR41","unstructured":"Tan, C., Chen, H.: Research on information security risk assessment methods. Confidential Sci. Technol. (10), 40\u201343 (2017)"},{"key":"6_CR42","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.jpdc.2021.05.007","volume":"156","author":"P Singh","year":"2021","unstructured":"Singh, P., Masud, M., Hossain, M.S., et al.: Cross-domain secure data sharing using blockchain for industrial IoT. J. Parallel Distrib. Comput. 156, 176\u2013184 (2021)","journal-title":"J. Parallel Distrib. Comput."},{"issue":"4","key":"6_CR43","doi-asserted-by":"publisher","first-page":"1476","DOI":"10.1109\/TEM.2019.2960829","volume":"67","author":"MS Rahman","year":"2020","unstructured":"Rahman, M.S., Al Omar, A., Bhuiyan, M.Z.A., et al.: Accountable cross-border data sharing using blockchain under relaxed trust assumption. IEEE Trans. Eng. Manage. 67(4), 1476\u20131486 (2020)","journal-title":"IEEE Trans. Eng. Manage."},{"key":"6_CR44","doi-asserted-by":"crossref","unstructured":"Heider-Aviet, A., Ollik, D.R., Berlato, S., et al.: Blockchain based ran data sharing. In: 2021 IEEE International Conference on Smart Data Services (SMDS), pp. 152\u2013161. IEEE (2021)","DOI":"10.1109\/SMDS53860.2021.00029"},{"key":"6_CR45","doi-asserted-by":"publisher","first-page":"636082","DOI":"10.3389\/fdgth.2021.636082","volume":"3","author":"EG Spanakis","year":"2021","unstructured":"Spanakis, E.G., Sfakianakis, S., Bonomi, S., et al.: Emerging and established trends to support secure health information exchange. Front. Digit. Health 3, 636082 (2021)","journal-title":"Front. Digit. Health"},{"key":"6_CR46","unstructured":"Guo, T.: Reflections on the regulation of cross border data flow in the digital economy era. World Sci. Technol. Res. Dev. 1 (2022)"},{"issue":"5","key":"6_CR47","first-page":"113","volume":"21","author":"TL Syroid","year":"2021","unstructured":"Syroid, T.L., Kaganovska, T.Y., Shamraieva, V.M., et al.: The personal data protection mechanism in the European union. Int. J. Comput. Sci. Netw. Secur. 21(5), 113\u2013120 (2021)","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"issue":"1","key":"6_CR48","first-page":"012026","volume":"1848","author":"X Yang","year":"2021","unstructured":"Yang, X.: Regulatory approaches of cross-border data flow in the big data era: china\u2019s choice. J. Phys.: Conf. Ser. 1848(1), 012026 (2021)","journal-title":"J. Phys.: Conf. Ser."},{"key":"6_CR49","doi-asserted-by":"publisher","first-page":"105610","DOI":"10.1016\/j.clsr.2021.105610","volume":"43","author":"G Zheng","year":"2021","unstructured":"Zheng, G.: Trilemma and tripartition: the regulatory paradigms of cross-border personal data transfer in the EU, the US and China. Comput. Law Secur. Rev. 43, 105610 (2021)","journal-title":"Comput. Law Secur. Rev."},{"key":"6_CR50","unstructured":"Casalini, F., Gonz\u00e1lez, J.L., Nemoto, T.: Mapping commonalities in regulatory approaches to cross-border data transfers (2021)"},{"key":"6_CR51","doi-asserted-by":"crossref","unstructured":"Ziyi, X.: International law protection of cross-border transmission of personal information based on cloud computing and big data. Mob. Inf. Sys. 2022 (2022)","DOI":"10.1155\/2022\/9672693"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-7032-2_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,7]],"date-time":"2023-11-07T23:03:50Z","timestamp":1699398230000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-7032-2_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819970315","9789819970322"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-7032-2_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"8 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISPEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security Practice and Experience","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 August 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ispec2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"80","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}