{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T17:06:23Z","timestamp":1726851983689},"publisher-location":"Cham","reference-count":39,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031573262"},{"type":"electronic","value":"9783031573279"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-57327-9_3","type":"book-chapter","created":{"date-parts":[[2024,3,29]],"date-time":"2024-03-29T03:01:47Z","timestamp":1711681307000},"page":"39-56","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Assessing the\u00a0Understandability and\u00a0Acceptance of\u00a0Attack-Defense Trees for\u00a0Modelling Security Requirements"],"prefix":"10.1007","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-4737-5761","authenticated-orcid":false,"given":"Giovanna","family":"Broccia","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2930-6367","authenticated-orcid":false,"given":"Maurice H.","family":"ter Beek","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7405-0818","authenticated-orcid":false,"given":"Alberto","family":"Lluch Lafuente","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7922-4936","authenticated-orcid":false,"given":"Paola","family":"Spoletini","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0636-5663","authenticated-orcid":false,"given":"Alessio","family":"Ferrari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,30]]},"reference":[{"issue":"16","key":"3_CR1","doi-asserted-by":"publisher","first-page":"3356","DOI":"10.1016\/j.ins.2011.04.005","volume":"181","author":"S Abrah\u00e3o","year":"2011","unstructured":"Abrah\u00e3o, S., Insfr\u00e1n, E., Cars\u00ed, J.A., Genero, M.: Evaluating requirements modeling methods based on user perceptions: a family of experiments. Inf. Sci. 181(16), 3356\u20133378 (2011)","journal-title":"Inf. Sci."},{"key":"3_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/978-3-319-66402-6_7","volume-title":"Computer Security \u2013 ESORICS 2017","author":"M Audinot","year":"2017","unstructured":"Audinot, M., Pinchinat, S., Kordy, B.: Is my attack tree correct? In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017. LNCS, vol. 10492, pp. 83\u2013102. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66402-6_7"},{"key":"3_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102381","volume":"109","author":"MH ter Beek","year":"2021","unstructured":"ter Beek, M.H., Legay, A., Lluch Lafuente, A., Vandin, A.: Quantitative security risk modeling and analysis with RisQFLan. Comput. Secur. 109, 102381 (2021)","journal-title":"Comput. Secur."},{"doi-asserted-by":"publisher","unstructured":"Broccia, G., ter Beek, M.H., Lluch Lafuente, A., Spoletini, P., Ferrari, A.: Assessing the Understandability of Attack-Defense Trees for Modelling Security Requirements: an Experimental Investigation - Supplementary Material. https:\/\/doi.org\/10.5281\/zenodo.10136730","key":"3_CR4","DOI":"10.5281\/zenodo.10136730"},{"doi-asserted-by":"crossref","unstructured":"Broccia, G., Ferrari, A., ter Beek, M., Cazzola, W., Favalli, L., Bertolotti, F.: Evaluating a language workbench: from working memory capacity to comprehension to acceptance. In: Proceedings 31st International Conference on Program Comprehension (ICPC), pp. 54\u201358. IEEE (2023)","key":"3_CR5","DOI":"10.1109\/ICPC58990.2023.00017"},{"doi-asserted-by":"crossref","unstructured":"Buyens, K., De Win, B., Joosen, W.: Empirical and statistical analysis of risk analysis-driven techniques for threat management. In: Proceedings 2nd International Conference on Availability, Reliability and Security (ARES), pp. 1034\u20131041. IEEE (2007)","key":"3_CR6","DOI":"10.1109\/ARES.2007.78"},{"key":"3_CR7","doi-asserted-by":"publisher","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"FD Davis","year":"1989","unstructured":"Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q. 13, 319\u2013340 (1989)","journal-title":"MIS Q."},{"key":"3_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-030-85315-0_13","volume-title":"Theoretical Aspects of Computing \u2013 ICTAC 2021","author":"J Eisentraut","year":"2021","unstructured":"Eisentraut, J., Holzer, S., Klioba, K., K\u0159et\u00ednsk\u00fd, J., Pin, L., Wagner, A.: Assessing security of cryptocurrencies with attack-defense trees: proof of concept and future directions. In: Cerone, A., \u00d6lveczky, P.C. (eds.) ICTAC 2021. LNCS, vol. 12819, pp. 214\u2013234. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-85315-0_13"},{"doi-asserted-by":"crossref","unstructured":"Ezenwoye, O., Liu, Y.: Risk-based security requirements model for web software. In: Proceedings 30th International Requirements Engineering Conference Workshops (REW), pp. 232\u2013237. IEEE (2022)","key":"3_CR9","DOI":"10.1109\/REW56159.2022.00051"},{"key":"3_CR10","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/s00766-009-0092-x","volume":"15","author":"B Fabian","year":"2010","unstructured":"Fabian, B., G\u00fcrses, S., Heisel, M., Santen, T., Schmidt, H.: A comparison of security requirements engineering methods. Requir. Eng. 15, 7\u201340 (2010)","journal-title":"Requir. Eng."},{"key":"3_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-319-74860-3_9","volume-title":"Graphical Models for Security","author":"O Gadyatskaya","year":"2018","unstructured":"Gadyatskaya, O., Trujillo-Rasua, R.: New directions in attack tree research: catching up with industrial needs. In: Liu, P., Mauw, S., St\u00f8len, K. (eds.) GraMSec 2017. LNCS, vol. 10744, pp. 115\u2013126. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-74860-3_9"},{"doi-asserted-by":"crossref","unstructured":"Giorgini, P., Mouratidis, H., Zannone, N.: Modelling Security and Trust with Secure Tropos. In: Integrating Security and Software Engineering: Advances and Future Visions, chap. 8, pp. 160\u2013189. IGI Global (2007)","key":"3_CR12","DOI":"10.4018\/978-1-59904-147-6.ch008"},{"doi-asserted-by":"crossref","unstructured":"Iankoulova, I., Daneva, M.: Cloud computing security requirements: A systematic review. In: Proceedings 6th International Conference on Research Challenges in Information Science (RCIS), pp. 1\u20137. IEEE (2012)","key":"3_CR13","DOI":"10.1109\/RCIS.2012.6240421"},{"key":"3_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-642-40196-1_15","volume-title":"Quantitative Evaluation of Systems","author":"B Kordy","year":"2013","unstructured":"Kordy, B., Kordy, P., Mauw, S., Schweitzer, P.: ADTool: security analysis with attack\u2013defense trees. In: Joshi, K., Siegle, M., Stoelinga, M., D\u2019Argenio, P.R. (eds.) QEST 2013. LNCS, vol. 8054, pp. 173\u2013176. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40196-1_15"},{"key":"3_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/978-3-642-19751-2_6","volume-title":"Formal Aspects of Security and Trust","author":"B Kordy","year":"2011","unstructured":"Kordy, B., Mauw, S., Radomirovi\u0107, S., Schweitzer, P.: Foundations of attack\u2013defense trees. In: Degano, P., Etalle, S., Guttman, J. (eds.) FAST 2010. LNCS, vol. 6561, pp. 80\u201395. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19751-2_6"},{"key":"3_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-319-89722-6_14","volume-title":"Principles of Security and Trust","author":"B Kordy","year":"2018","unstructured":"Kordy, B., Wide\u0142, W.: On quantitative analysis of attack\u2013defense trees with repeated labels. In: Bauer, L., K\u00fcsters, R. (eds.) POST 2018. LNCS, vol. 10804, pp. 325\u2013346. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-89722-6_14"},{"key":"3_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-319-54045-0_15","volume-title":"Requirements Engineering: Foundation for Software Quality","author":"K Labunets","year":"2017","unstructured":"Labunets, K., Massacci, F., Paci, F.: On the equivalence between graphical and tabular representations for security risk assessment. In: Gr\u00fcnbacher, P., Perini, A. (eds.) REFSQ 2017. LNCS, vol. 10153, pp. 191\u2013208. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-54045-0_15"},{"doi-asserted-by":"crossref","unstructured":"Labunets, K., Massacci, F., Paci, F., Tran, L.M.S.: An experimental comparison of two risk-based security methods. In: Proceedings 7th International Symposium on Empirical Software Engineering and Measurement (ESEM), pp. 163\u2013172. IEEE (2013)","key":"3_CR18","DOI":"10.1109\/ESEM.2013.29"},{"issue":"5","key":"3_CR19","doi-asserted-by":"publisher","first-page":"1110","DOI":"10.1109\/TIFS.2017.2771238","volume":"13","author":"HS Lallie","year":"2018","unstructured":"Lallie, H.S., Debattista, K., Bal, J.: An empirical evaluation of the effectiveness of attack graphs and fault trees in cyber-attack perception. IEEE Trans. Inf. Forensics Secur. 13(5), 1110\u20131122 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"3_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2019.100219","volume":"35","author":"HS Lallie","year":"2020","unstructured":"Lallie, H.S., Debattista, K., Bal, J.: A review of attack graph and attack tree visual syntax in cyber security. Comput. Sci. Rev. 35, 100219 (2020)","journal-title":"Comput. Sci. Rev."},{"issue":"1","key":"3_CR21","first-page":"89","volume":"3","author":"L Liu","year":"2009","unstructured":"Liu, L., Yu, E.S.K., Mylopoulos, J.: Secure-I*: engineering secure software systems through social analysis. Int. J. Softw. Inform. 3(1), 89\u2013120 (2009)","journal-title":"Int. J. Softw. Inform."},{"key":"3_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/3-540-45800-X_33","volume-title":"UML 2002 \u2014 The Unified Modeling Language","author":"T Lodderstedt","year":"2002","unstructured":"Lodderstedt, T., Basin, D., Doser, J.: SecureUML: a UML-based modeling language for model-driven security. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 426\u2013441. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45800-X_33"},{"key":"3_CR23","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.infsof.2018.04.007","volume":"100","author":"PX Mai","year":"2018","unstructured":"Mai, P.X., Goknil, A., Shar, L.K., Pastore, F., Briand, L.C., Shaame, S.: Modeling security and privacy requirements: a use case-driven approach. Inf. Softw. Technol. 100, 165\u2013182 (2018)","journal-title":"Inf. Softw. Technol."},{"key":"3_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/11734727_17","volume-title":"Information Security and Cryptology - ICISC 2005","author":"S Mauw","year":"2006","unstructured":"Mauw, S., Oostdijk, M.: Foundations of attack trees. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 186\u2013198. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11734727_17"},{"issue":"1","key":"3_CR25","doi-asserted-by":"publisher","first-page":"43","DOI":"10.3102\/00346543059001043","volume":"59","author":"RE Mayer","year":"1989","unstructured":"Mayer, R.E.: Models for understanding. Rev. Educ. Res. 59(1), 43\u201364 (1989)","journal-title":"Rev. Educ. Res."},{"issue":"4","key":"3_CR26","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.csi.2010.01.006","volume":"32","author":"D Mellado","year":"2010","unstructured":"Mellado, D., Blanco, C., Sanchez, L.E., Fern\u00e1ndez-Medina, E.: A systematic review of security requirements engineering. Comput. Stand. Interfaces 32(4), 153\u2013165 (2010)","journal-title":"Comput. Stand. Interfaces"},{"unstructured":"Moody, D.L.: Dealing with Complexity: A Practical Method for Representing Large Entity Relationship Models. Ph.D. thesis, University of Melbourne (2001)","key":"3_CR27"},{"doi-asserted-by":"crossref","unstructured":"Oliveira, D., Bruno, R., Madeiral, F., Castor, F.: Evaluating code readability and legibility: an examination of human-centric studies. In: Proceedings 36th International Conference on Software Maintenance and Evolution (ICSME), pp. 348\u2013359. IEEE (2020)","key":"3_CR28","DOI":"10.1109\/ICSME46990.2020.00041"},{"key":"3_CR29","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.datak.2015.07.007","volume":"98","author":"E Paja","year":"2015","unstructured":"Paja, E., Dalpiaz, F., Giorgini, P.: Modelling and reasoning about security requirements in socio-technical systems. Data Knowl. Eng. 98, 123\u2013143 (2015)","journal-title":"Data Knowl. Eng."},{"doi-asserted-by":"crossref","unstructured":"Salehie, M., Pasquale, L., Omoronyia, I., Ali, R., Nuseibeh, B.: Requirements-driven adaptive security: protecting variable assets at runtime. In: Proceedings 20th International Requirements Engineering Conference (RE), pp. 111\u2013120. IEEE (2012)","key":"3_CR30","DOI":"10.1109\/RE.2012.6345794"},{"unstructured":"Schneier, B.: Attack Trees. Dr. Dobb\u2019s J. (1999)","key":"3_CR31"},{"doi-asserted-by":"crossref","unstructured":"Sharafi, Z., Marchetto, A., Susi, A., Antoniol, G., Gu\u00e9h\u00e9neuc, Y.G.: An empirical study on the efficiency of graphical vs. textual representations in requirements comprehension. In: Proceedings 21st International Conference on Program Comprehension (ICPC), pp. 33\u201342. IEEE (2013)","key":"3_CR32","DOI":"10.1109\/ICPC.2013.6613831"},{"key":"3_CR33","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/s00766-004-0194-4","volume":"10","author":"G Sindre","year":"2005","unstructured":"Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. Requir. Eng. 10, 34\u201344 (2005)","journal-title":"Requir. Eng."},{"key":"3_CR34","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/s00766-015-0220-8","volume":"21","author":"A Souag","year":"2016","unstructured":"Souag, A., Mazo, R., Salinesi, C., Comyn-Wattiau, I.: Reusable knowledge in security requirements engineering: a systematic mapping study. Requir. Eng. 21, 251\u2013283 (2016)","journal-title":"Requir. Eng."},{"key":"3_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/11538097_6","volume-title":"Model Driven Architecture","author":"D Stein","year":"2005","unstructured":"Stein, D., Hanenberg, S., Unland, R.: A graphical notation to specify model queries for MDA transformations on UML models. In: A\u00dfmann, U., Aksit, M., Rensink, A. (eds.) MDAFA 2003-2004. LNCS, vol. 3599, pp. 77\u201392. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11538097_6"},{"unstructured":"Vesely, W.E., Goldberg, F.F., Roberts, N.H., Haasl, D.F.: Fault Tree Handbook. Technical Report NUREG-0492, Nuclear Regulatory Commission, USA (1981)","key":"3_CR36"},{"doi-asserted-by":"crossref","unstructured":"Villamizar, H., Kalinowski, M., Viana, M., Fern\u00e1ndez, D.M.: A systematic mapping study on security in agile requirements engineering. In: Proceedings 44th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), pp. 454\u2013461. IEEE (2018)","key":"3_CR37","DOI":"10.1109\/SEAA.2018.00080"},{"issue":"4","key":"3_CR38","first-page":"75:1","volume":"52","author":"W Wide\u0142","year":"2019","unstructured":"Wide\u0142, W., Audinot, M., Fila, B., Pinchinat, S.: Beyond 2014: formal methods for attack tree-based security modeling. ACM Comput. Surv. 52(4), 75:1-75:36 (2019)","journal-title":"ACM Comput. Surv."},{"issue":"14","key":"3_CR39","doi-asserted-by":"publisher","first-page":"4981","DOI":"10.3390\/app10144981","volume":"10","author":"S Zareen","year":"2020","unstructured":"Zareen, S., Akram, A., Khan, S.A.: Security requirements engineering framework with BPMN 2.0.2 extension model for development of information systems. Appl. Sci. 10(14), 4981 (2020)","journal-title":"Appl. Sci."}],"container-title":["Lecture Notes in Computer Science","Requirements Engineering: Foundation for Software Quality"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-57327-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,29]],"date-time":"2024-03-29T03:02:34Z","timestamp":1711681354000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-57327-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031573262","9783031573279"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-57327-9_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"30 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"REFSQ","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Working Conference on Requirements Engineering: Foundation for Software Quality","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Winterthur","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Switzerland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 April 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 April 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"refsq2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2024.refsq.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"59","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}