{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T16:08:56Z","timestamp":1726762136032},"publisher-location":"Cham","reference-count":53,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030609740"},{"type":"electronic","value":"9783030609757"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-60975-7_31","type":"book-chapter","created":{"date-parts":[[2020,10,7]],"date-time":"2020-10-07T23:07:55Z","timestamp":1602112075000},"page":"427-439","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["ALONE: A Dataset for Toxic Behavior Among Adolescents on Twitter"],"prefix":"10.1007","author":[{"given":"Thilini","family":"Wijesiriwardene","sequence":"first","affiliation":[]},{"given":"Hale","family":"Inan","sequence":"additional","affiliation":[]},{"given":"Ugur","family":"Kursuncu","sequence":"additional","affiliation":[]},{"given":"Manas","family":"Gaur","sequence":"additional","affiliation":[]},{"given":"Valerie L.","family":"Shalin","sequence":"additional","affiliation":[]},{"given":"Krishnaprasad","family":"Thirunarayan","sequence":"additional","affiliation":[]},{"given":"Amit","family":"Sheth","sequence":"additional","affiliation":[]},{"given":"I. Budak","family":"Arpinar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,7]]},"reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"Arpinar, I.B., Kursuncu, U., Achilov, D.: Social media analytics to identify and counter islamist extremism: systematic detection, evaluation, and challenging of extremist narratives online. In: 2016 International Conference on Collaboration Technologies and Systems (CTS), pp. 611\u2013612. IEEE (2016)","DOI":"10.1109\/CTS.2016.0113"},{"key":"31_CR2","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1017\/S0033291709991383","volume":"40","author":"L Arseneault","year":"2010","unstructured":"Arseneault, L., Bowes, L., Shakoor, S.: Bullying victimization in youths and mental health problems: \u201cmuch ado about nothing\u201d? Psychol. Med. 40, 717 (2010)","journal-title":"Psychol. Med."},{"key":"31_CR3","doi-asserted-by":"crossref","unstructured":"Badjatiya, P., Gupta, M., Varma, V.: Stereotypical bias removal for hate speech detection task using knowledge-based generalizations. In: The World Wide Web Conference, pp. 49\u201359 (2019)","DOI":"10.1145\/3308558.3313504"},{"key":"31_CR4","doi-asserted-by":"crossref","unstructured":"Badjatiya, P., Gupta, S., Gupta, M., Varma, V.: Deep learning for hate speech detection in tweets. In: WWW (2017)","DOI":"10.1145\/3041021.3054223"},{"key":"31_CR5","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1001\/jama.282.5.440","volume":"282","author":"ND Brener","year":"1999","unstructured":"Brener, N.D., Simon, T.R., Krug, E.G., Lowry, R.: Recent trends inviolence-related behaviors among high school students in the United States. JAMA 282, 440\u2013446 (1999)","journal-title":"JAMA"},{"key":"31_CR6","doi-asserted-by":"crossref","unstructured":"Buss, A.H.: The psychology of aggression (1961)","DOI":"10.1037\/11160-000"},{"key":"31_CR7","unstructured":"Carletta, J., Isard, A., Isard, S., Kowtko, J.C., Doherty-Sneddon, G., Anderson, A.H.: The reliability of a dialogue structure coding scheme (1997)"},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"Chatzakou, D., Kourtellis, N., Blackburn, J., De Cristofaro, E., Stringhini, G., Vakali, A.: Mean birds: detecting aggression and bullying on twitter. In: ACM Web Science (2017)","DOI":"10.1145\/3091478.3091487"},{"key":"31_CR9","unstructured":"Crumback, D.: Subtweets: the new online harassment (2017)"},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"Davidson, T., Warmsley, D., Macy, M., Weber, I.: Automated hate speech detection and the problem of offensive language. In: AAAI-ICWSM (2017)","DOI":"10.1609\/icwsm.v11i1.14955"},{"key":"31_CR11","unstructured":"Dinakar, K., Reichart, R., Lieberman, H.: Modeling the detection of textual cyberbullying. In: AAAI-ICWSM (2011)"},{"key":"31_CR12","unstructured":"Duong, C.T., Lebret, R., Aberer, K.: Multimodal classification for analysing social media. arXiv preprint arXiv:1708.02099 (2017)"},{"key":"31_CR13","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1016\/j.chb.2016.05.050","volume":"63","author":"A Edwards","year":"2016","unstructured":"Edwards, A., Harris, C.J.: To tweet or \u201csubtweet\u201d?: impacts of social networking post directness and valence on interpersonal impressions. Comput. Hum. Behav. 63, 304\u2013310 (2016)","journal-title":"Comput. Hum. Behav."},{"key":"31_CR14","doi-asserted-by":"crossref","unstructured":"Founta, A., et al.: Large scale crowdsourcing and characterization of Twitter abusive behavior (2018)","DOI":"10.1609\/icwsm.v12i1.14991"},{"key":"31_CR15","doi-asserted-by":"crossref","unstructured":"Gaur, M., et al.: Knowledge-aware assessment of severity of suicide risk for early intervention. In: The World Wide Web Conference, pp. 514\u2013525. ACM (2019)","DOI":"10.1145\/3308558.3313698"},{"key":"31_CR16","doi-asserted-by":"crossref","unstructured":"Golbeck, J., et al.: A large labeled corpus for online harassment research. In: ACM Web Science (2017)","DOI":"10.1145\/3091478.3091509"},{"key":"31_CR17","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: CVPR (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"31_CR18","doi-asserted-by":"crossref","unstructured":"Hosseinmardi, H., Mattson, S.A., Rafiq, R.I., Han, R., Lv, Q., Mishra, S.: Analyzing labeled cyberbullying incidents on the Instagram social network. In: SocInfo (2015)","DOI":"10.1007\/978-3-319-27433-1_4"},{"key":"31_CR19","first-page":"267","volume":"4","author":"T Jay","year":"2008","unstructured":"Jay, T., Janschewitz, K.: The pragmatics of swearing. J. Polit. Res. Lang. Behav. Cult. 4, 267\u2013288 (2008)","journal-title":"J. Polit. Res. Lang. Behav. Cult."},{"key":"31_CR20","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1002\/ab.3","volume":"27","author":"K Kumpulainen","year":"2001","unstructured":"Kumpulainen, K., R\u00e4s\u00e4nen, E., Puura, K.: Psychiatric disorders and the use of mental health services among children involved in bullying. Aggressive Behav. J. 27, 102\u2013110 (2001)","journal-title":"Aggressive Behav. J."},{"key":"31_CR21","unstructured":"Kursuncu, U.: Modeling the persona in persuasive discourse on social media using context-aware and knowledge-driven learning. Ph.D. thesis, University of Georgia (2018)"},{"key":"31_CR22","doi-asserted-by":"crossref","unstructured":"Kursuncu, U., et al.: Modeling islamist extremist communications on social media using contextual dimensions: religion, ideology, and hate. In: Proceedings of the ACM on Human-Computer Interaction, vol. 3,no. CSCW, pp. 1\u201322 (2019)","DOI":"10.1145\/3359253"},{"key":"31_CR23","doi-asserted-by":"crossref","unstructured":"Kursuncu, U., et al.: What\u2019s ur type? Contextualized classification of user types in marijuana-related communications using compositional multiview embedding. In: 2018 IEEE\/WIC\/ACM International Conference on Web Intelligence (WI), pp. 474\u2013479. IEEE (2018)","DOI":"10.1109\/WI.2018.00-50"},{"key":"31_CR24","series-title":"Lecture Notes in Social Networks","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-319-94105-9_4","volume-title":"Emerging Research Challenges and Opportunities in Computational Social Network Analysis and Mining","author":"U Kursuncu","year":"2019","unstructured":"Kursuncu, U., Gaur, M., Lokala, U., Thirunarayan, K., Sheth, A., Arpinar, I.B.: Predictive analysis on Twitter: techniques and applications. In: Agarwal, N., Dokoohaki, N., Tokdemir, S. (eds.) Emerging Research Challenges and Opportunities in Computational Social Network Analysis and Mining. LNSN, pp. 67\u2013104. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-319-94105-9_4"},{"key":"31_CR25","unstructured":"Kursuncu, U., Gaur, M., Sheth, A.: Knowledge infused learning (K-IL): towards deep incorporation of knowledge in deep learning. In: Proceedings of the AAAI 2020 Spring Symposium on Combining Machine Learning and Knowledge Engineering in Practice. Stanford University, Palo Alto, California, USA. AAAI-MAKE (2020)"},{"key":"31_CR26","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1111\/j.1365-2850.2012.01902.x","volume":"20","author":"J Liu","year":"2013","unstructured":"Liu, J., Lewis, G., Evans, L.: Understanding aggressive behaviour across the lifespan. J. Psychiatric Ment. Health Nurs. 20, 156\u2013168 (2013)","journal-title":"J. Psychiatric Ment. Health Nurs."},{"key":"31_CR27","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/S0749-3797(97)00020-2","volume":"14","author":"R Lowry","year":"1998","unstructured":"Lowry, R., Powell, K.E., Kann, L., Collins, J.L., Kolbe, L.J.: Weapon-carrying, physical fighting, and fight-related injury among us adolescents. Am. J. Prevent. Med. 14, 122\u2013129 (1998)","journal-title":"Am. J. Prevent. Med."},{"key":"31_CR28","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1016\/j.childyouth.2014.04.010","volume":"44","author":"F Mishna","year":"2014","unstructured":"Mishna, F., Schwan, K.J., Lefebvre, R., Bhole, P., Johnston, D.: Students in distress: unanticipated findings in a cyber bullying study. Child. Youth Serv. Rev. 44, 341\u2013348 (2014)","journal-title":"Child. Youth Serv. Rev."},{"key":"31_CR29","unstructured":"Namie, G., Namie, R.: Bully at work: what you can do to stop the hurt and reclaim your dignity on the job (2009)"},{"key":"31_CR30","doi-asserted-by":"publisher","first-page":"205630511560484","DOI":"10.1177\/2056305115604848","volume":"1","author":"P Nilan","year":"2015","unstructured":"Nilan, P., Burgess, H., Hobbs, M., Threadgold, S., Alexander, W.: Youth, social media, and cyberbullying among australian youth: \u201csick friend\u201d. Soc. Media + Soc. 1, 2056305115604848 (2015)","journal-title":"Soc. Media + Soc."},{"key":"31_CR31","doi-asserted-by":"crossref","unstructured":"Nobata, C., Tetreault, J., Thomas, A., Mehdad, Y., Chang, Y.: Abusive language detection in online user content. In: WWW (2016)","DOI":"10.1145\/2872427.2883062"},{"key":"31_CR32","doi-asserted-by":"crossref","unstructured":"O\u2019Halloran, K., Chua, A., Podlasov, A.: The role of images in social media analytics: a multimodal digital humanities approach. In: Visual communication (2014)","DOI":"10.1515\/9783110255492.565"},{"key":"31_CR33","unstructured":"Papegnies, E., Labatut, V., Dufour, R., Linar\u00e8s, G.: Detection of abusive messages in an on-line community. In: CORIA (2017)"},{"issue":"3","key":"31_CR34","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1037\/men0000156","volume":"20","author":"MC Parent","year":"2019","unstructured":"Parent, M.C., Gobble, T.D., Rochlen, A.: Social media behavior, toxic masculinity, and depression. Psychol. Men Masculinities 20(3), 277 (2019)","journal-title":"Psychol. Men Masculinities"},{"key":"31_CR35","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1177\/1541204006286288","volume":"4","author":"JW Patchin","year":"2006","unstructured":"Patchin, J.W., Hinduja, S.: Bullies move beyond the schoolyard: a preliminary look at cyberbullying. Youth Violence Juvenile Justice 4, 148\u2013169 (2006)","journal-title":"Youth Violence Juvenile Justice"},{"issue":"9","key":"31_CR36","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1007\/s11920-014-0472-x","volume":"16","author":"M Rafla","year":"2014","unstructured":"Rafla, M., Carson, N.J., DeJong, S.M.: Adolescents and the internet: what mental health clinicians need to know. Curr. Psychiatry Rep. 16(9), 472 (2014)","journal-title":"Curr. Psychiatry Rep."},{"key":"31_CR37","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-642-13059-5_5","volume-title":"Advances in Artificial Intelligence","author":"AH Razavi","year":"2010","unstructured":"Razavi, A.H., Inkpen, D., Uritsky, S., Matwin, S.: Offensive language detection using multi-level classification. In: Farzindar, A., Ke\u0161elj, V. (eds.) AI 2010. LNCS (LNAI), vol. 6085, pp. 16\u201327. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13059-5_5"},{"issue":"3","key":"31_CR38","doi-asserted-by":"publisher","first-page":"e0227330","DOI":"10.1371\/journal.pone.0227330","volume":"15","author":"M Rezvan","year":"2020","unstructured":"Rezvan, M., Shekarpour, S., Alshargi, F., Thirunarayan, K., Shalin, V.L., Sheth, A.: Analyzing and learning the language for different types of harassment. PLoS One 15(3), e0227330 (2020)","journal-title":"PLoS One"},{"key":"31_CR39","doi-asserted-by":"crossref","unstructured":"Rezvan, M., Shekarpour, S., Balasuriya, L., Thirunarayan, K., Shalin, V.L., Sheth, A.: A quality type-aware annotated corpus and lexicon for harassment research. In: ACM Web Science (2018)","DOI":"10.1145\/3201064.3201103"},{"key":"31_CR40","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1037\/a0018164","volume":"24","author":"I Rivers","year":"2009","unstructured":"Rivers, I., Poteat, V.P., Noret, N., Ashurst, N.: Observing bullying at school: the mental health implications of witness status. School Psychol. Quart. 24, 211 (2009)","journal-title":"School Psychol. Quart."},{"key":"31_CR41","doi-asserted-by":"crossref","unstructured":"Safadi, H., et al.: Curtailing fake news propagation with psychographics. Available atSSRN 3558236 (2020)","DOI":"10.2139\/ssrn.3558236"},{"key":"31_CR42","doi-asserted-by":"crossref","unstructured":"Salminen, J., et al.: Anatomy of online hate: developing a taxonomy and machine learning models for identifying and classifying hate in online news media. In: ICWSM, pp. 330\u2013339 (2018)","DOI":"10.1609\/icwsm.v12i1.15028"},{"key":"31_CR43","unstructured":"Sharma, S., Agrawal, S., Shrivastava, M.: Degree based classification of harmful speech using Twitter data. arXiv preprint arXiv:1806.04197 (2018)"},{"key":"31_CR44","unstructured":"Silva, L., Mondal, M., Correa, D., Benevenuto, F., Weber, I.: Analyzing the targets of hate in online social media. In: AAAI-ICWSM (2016)"},{"key":"31_CR45","unstructured":"Sober\u00f3n, G., Aroyo, L., Welty, C., Inel, O., Lin, H., Overmeen, M.: Measuring crowd truth: disagreement metrics combined with worker behavior filters. In: CrowdSem 2013 Workshop (2013)"},{"key":"31_CR46","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1080\/01425692.2012.662824","volume":"33","author":"DM S\u00f8ndergaard","year":"2012","unstructured":"S\u00f8ndergaard, D.M.: Bullying and social exclusion anxiety in schools. Br. J. Sociol. Educ. 33, 55\u2013372 (2012)","journal-title":"Br. J. Sociol. Educ."},{"key":"31_CR47","unstructured":"Unicef, et al.: An everyday lesson: end violence in schools (2018)"},{"key":"31_CR48","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1016\/S2352-4642(19)30186-5","volume":"3","author":"RM Viner","year":"2019","unstructured":"Viner, R.M., et al.: Roles of cyberbullying, sleep, and physical activity in mediating the effects of social media use on mental health and wellbeing among young people in England: a secondary analysis of longitudinal data. Lancet Child Adolescent Health 3, 685\u2013696 (2019)","journal-title":"Lancet Child Adolescent Health"},{"issue":"6","key":"31_CR49","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1037\/0003-066X.53.6.647","volume":"53","author":"A Wandersman","year":"1998","unstructured":"Wandersman, A., Nation, M.: Urban neighborhoods and mental health: psychological contributions to understanding toxicity, resilience, and interventions. Am. Psychol. 53(6), 647 (1998)","journal-title":"Am. Psychol."},{"key":"31_CR50","unstructured":"Warner, W., Hirschberg, J.: Detecting hate speech on the world wide web. In: ACL (2012)"},{"key":"31_CR51","doi-asserted-by":"crossref","unstructured":"Waseem, Z.: Are you a racist or am i seeing things? Annotator influence on hate speech detection on twitter. In: NLP-CSS (2016)","DOI":"10.18653\/v1\/W16-5618"},{"key":"31_CR52","doi-asserted-by":"crossref","unstructured":"Waseem, Z., Hovy, D.: Hateful symbols or hateful people? Predictive features for hate speech detection on Twitter. In: NAACL (2016)","DOI":"10.18653\/v1\/N16-2013"},{"key":"31_CR53","doi-asserted-by":"crossref","unstructured":"Wijeratne, S., Balasuriya, L., Sheth, A., Doran, D.: EmojiNet: an open service and API for emoji sense discovery. In: AAAI-ICWSM (2017)","DOI":"10.1609\/icwsm.v11i1.14857"}],"container-title":["Lecture Notes in Computer Science","Social Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-60975-7_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,22]],"date-time":"2022-11-22T13:25:01Z","timestamp":1669123501000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-60975-7_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030609740","9783030609757"],"references-count":53,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-60975-7_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"7 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SocInfo","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Social Informatics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pisa","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"socinfo2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/kdd.isti.cnr.it\/socinfo2020\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easy chair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"99","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}