{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T20:28:30Z","timestamp":1743020910866,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030299583"},{"type":"electronic","value":"9783030299590"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-29959-0_21","type":"book-chapter","created":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T23:04:10Z","timestamp":1568502250000},"page":"429-449","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Where to Look for What You See Is What You Sign? User Confusion in Transaction Security"],"prefix":"10.1007","author":[{"given":"Vincent","family":"Haupert","sequence":"first","affiliation":[]},{"given":"Stephan","family":"Gabert","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,15]]},"reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Anderson, B.B., Kirwan, C.B., Jenkins, J.L., Eargle, D., Howard, S., Vance, A.: How polymorphic warnings reduce habituation in the brain: insights from an fMRI study. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI 2015, Seoul, Republic of Korea, 18\u201323 April 2015, pp. 2883\u20132892 (2015)","DOI":"10.1145\/2702123.2702322"},{"issue":"3","key":"21_CR2","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1093\/biomet\/93.3.491","volume":"93","author":"Y Benjamini","year":"2006","unstructured":"Benjamini, Y., Krieger, A.M., Yekutieli, D.: Adaptive linear step-up procedures that control the false discovery rate. Biometrika 93(3), 491\u2013507 (2006)","journal-title":"Biometrika"},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Blythe, M., Petrie, H., and Clark, J.A.: F for fake: four studies on how we fall for phish. In: Proceedings of the International Conference on Human Factors in Computing Systems, CHI 2011, Vancouver, BC, Canada, 7\u201312 May 2011, pp. 3469\u20133478 (2011)","DOI":"10.1145\/1978942.1979459"},{"key":"21_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/978-3-319-93411-2_10","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"M Carminati","year":"2018","unstructured":"Carminati, M., Baggio, A., Maggi, F., Spagnolini, U., Zanero, S.: FraudBuster: temporal analysis and detection of advanced financial frauds. In: Giuffrida, C., Bardin, S., Blanc, G. (eds.) DIMVA 2018. LNCS, vol. 10885, pp. 211\u2013233. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-93411-2_10"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Das, S., Dingman, A., and Camp, L.J.: Why johnny doesn\u2019t use two factor: a two-phase usability study of the FIDO U2F Security Key. In: Financial Cryptography and Data Security - 22nd International Conference, FC 2018, Cura\u00e7ao, 26 February\u2013 2 March, 2018, Revised Selected Papers (2018)","DOI":"10.1007\/978-3-662-58387-6_9"},{"issue":"2","key":"21_CR6","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.ijhcs.2013.10.003","volume":"72","author":"N Davinson","year":"2014","unstructured":"Davinson, N., Sillence, E.: Using the health belief model to explore users\u2019 perceptions of \u2018being safe and secure\u2019 in the world of technology mediated financial transactions. Int. J. Hum. Comput. Stud. 72(2), 154\u2013168 (2014)","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"21_CR7","unstructured":"Dhamija, R., Tygar, J.D., and Hearst, M.A.: Why phishing works. In: Proceedings of the 2006 Conference on Human Factors in Computing Systems, CHI 2006, Montr\u00e9al, Qu\u00e9bec, Canada, 22\u201327 April 2006, pp. 581\u2013590 (2006)"},{"key":"21_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/978-3-642-39884-1_5","volume-title":"Financial Cryptography and Data Security","author":"S Egelman","year":"2013","unstructured":"Egelman, S., Schechter, S.: The importance of being earnest [in security warnings]. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 52\u201359. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39884-1_5"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Etaher, N., Weir, G.R.S., Alazab, M.: From ZeuS to Zitmo: trends in banking malware. In: 2015 IEEE TrustCom\/BigDataSE\/ISPA, Helsinki, Finland, 20\u201322 August 2015, vol. 1, pp. 1386\u20131391 (2015)","DOI":"10.1109\/Trustcom.2015.535"},{"key":"21_CR10","unstructured":"European Union Agency for Network and Information Security: Flash note: EU cyber security agency ENISA; \u201cHigh Roller\u201d online bank robberies reveal security gaps (2012). https:\/\/www.enisa.europa.eu\/news\/enisa-news\/copy_of_eu-cyber-security-agency-enisa-201chigh-roller201d-online-bank-robberiesreveal-security-gaps. Accessed June 05 2018"},{"key":"21_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-319-39381-0_4","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"VMIA Hartl","year":"2016","unstructured":"Hartl, V.M.I.A., Schmuntzsch, U.: Fraud protection for online banking - a user-centered approach on detecting typical double-dealings due to social engineering and inobservance whilst operating with personal login credentials. In: Tryfonas, T. (ed.) HAS 2016. LNCS, vol. 9750, pp. 37\u201347. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-39381-0_4"},{"issue":"3","key":"21_CR12","first-page":"807","volume":"11","author":"JTG Hwang","year":"2001","unstructured":"Hwang, J.T.G., Yang, M.-C.: An optimality theory for mid p-values In 2 x 2 contingency tables. Statistica Sinica 11(3), 807\u2013826 (2001)","journal-title":"Statistica Sinica"},{"issue":"10","key":"21_CR13","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/1290958.1290968","volume":"50","author":"TN Jagatic","year":"2007","unstructured":"Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.: Social phishing. Commun. ACM 50(10), 94\u2013100 (2007)","journal-title":"Commun. ACM"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Kiljan, S., Vranken, H.P.E., van Eekelen, M.C.J.D.: What you enter is what you sign: input integrity in an online banking environment. In: 2014 Workshop on Socio-Technical Aspects in Security and Trust, STAST 2014, Vienna, Austria, 18 July 2014, pp. 40\u201347 (2014)","DOI":"10.1109\/STAST.2014.14"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Krol, K., Philippou, E., Cristofaro, E.D., and Sasse, M.A.: \u201cThey brought in the horrible key ring thing!\u201d Analysing the usability of two-factor authentication in UK online banking. In: Proceedings of the NDSS Workshop on Usable Security, USEC 2015, San Diego, California, USA, 8\u201311 February 2015 (2015)","DOI":"10.14722\/usec.2015.23001"},{"issue":"2","key":"21_CR16","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/S0167-4048(98)80005-8","volume":"3","author":"P Landrock","year":"1998","unstructured":"Landrock, P., Pedersen, T.P.: WYSIWYS? - what you see is what you sign? Inf. Sec. Techn. Rep. 3(2), 55\u201361 (1998)","journal-title":"Inf. Sec. Techn. Rep."},{"key":"21_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-642-27576-0_19","volume-title":"Financial Cryptography and Data Security","author":"S Li","year":"2012","unstructured":"Li, S., Sadeghi, A.-R., Heisrath, S., Schmitz, R., Ahmad, J.J.: hPIN\/hTAN: a lightweight and low-cost E-banking solution against untrusted computers. In: Danezis, G. (ed.) FC 2011. LNCS, vol. 7035, pp. 235\u2013249. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-27576-0_19"},{"issue":"7","key":"21_CR18","doi-asserted-by":"publisher","first-page":"1159","DOI":"10.1002\/sim.3531","volume":"28","author":"S Lydersen","year":"2009","unstructured":"Lydersen, S., Fagerland, M.W., Laake, P.: Recommended tests for association in 2 x 2 tables. Stat. Med. 28(7), 1159\u20131175 (2009)","journal-title":"Stat. Med."},{"key":"21_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1007\/978-3-662-54970-4_35","volume-title":"Financial Cryptography and Data Security","author":"SJ Murdoch","year":"2017","unstructured":"Murdoch, S.J., et al.: Are payment card contracts unfair? (short paper). In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 600\u2013608. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-662-54970-4_35"},{"key":"21_CR20","unstructured":"Norisbank GmbH: norisbank-Umfrage zum Thema Online-Banking, German (2016). https:\/\/www.norisbank.de\/ueberuns\/presseinformation-norisbank-umfrageonline-banking-ein-viertel-der-deutschen-nutzt-veraltetes-tan-verfahren.html. Accessed 20 May 2018"},{"key":"21_CR21","unstructured":"Onarlioglu, K., Yilmaz, U.O., Kirda, E., Balzarotti, D.: Insights into user behavior in dealing with internet attacks. In: 19th Annual Network and Distributed System Security Symposium, NDSS 2012, San Diego, California, USA, 5\u20138 February 2012 (2012)"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Reynolds, J., Smith, T., Reese, K., Dickinson, L., Ruoti, S., Seamons, K.: A tale of two studies: the best and worst of YubiKey usability. In: 2018 IEEE Symposium on Security and Privacy, SP 2018, San Francisco, CA, USA, 20\u201322 May 2018, pp. 1090\u20131106 (2018)","DOI":"10.1109\/SP.2018.00067"},{"key":"21_CR23","unstructured":"Rosoff, H., Cui, J., and John, R.S.: Behavioral experiments exploring victims\u2019 response to cyber-based financial fraud and identity theft scenario simulations. In: Tenth Symposium on Usable Privacy and Security, SOUPS 2014, Menlo Park, CA, USA, 9\u201311 July 2014, pp. 175\u2013186 (2014)"},{"key":"21_CR24","doi-asserted-by":"crossref","unstructured":"Schechter, S.E., Dhamija, R., Ozment, A., Fischer, I.: The emperor\u2019s new security indicators. In: 2007 IEEE Symposium on Security and Privacy (S&P 2007), Oakland, California, USA, 20\u201323 May 2007, pp. 51\u201365 (2007)","DOI":"10.1109\/SP.2007.35"},{"issue":"5","key":"21_CR25","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/MSP.2016.101","volume":"14","author":"B Schneier","year":"2016","unstructured":"Schneier, B.: Stop trying to fix the user. IEEE Secur. Priv. 14(5), 96 (2016)","journal-title":"IEEE Secur. Priv."},{"key":"21_CR26","unstructured":"Sheng, S., Holbrook, M.B., Kumaraguru, P., Cranor, L.F., Downs, J.S.: Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions. In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI 2010, Atlanta, Georgia, USA, 10\u201315 April 2010, pp. 373\u2013382 (2010)"},{"key":"21_CR27","doi-asserted-by":"crossref","unstructured":"Sun, H., Sun, K., Wang, Y., Jing, J.: TrustOTP: transforming smartphones into secure one-time password tokens. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, 12\u201316 October 2015, pp. 976\u2013988 (2015)","DOI":"10.1145\/2810103.2813692"},{"key":"21_CR28","doi-asserted-by":"crossref","unstructured":"Watson, B., Zheng, J.: On the user awareness of mobile security recommendations. In: Proceedings of the 2017 ACM Southeast Regional Conference, Kennesaw, GA, USA, 13\u201315 April 2017, pp. 120\u2013127 (2017)","DOI":"10.1145\/3077286.3077563"},{"key":"21_CR29","unstructured":"Zomai, M.A., AlFayyadh, B., J\u00f8sang, A., McCullagh, A.: An experimental investigation of the usability of transaction authorization in online bank security systems. In: Brankovic, L., Miller, M. (eds.) Sixth Australasian Information Security Conference, AISC 2008, Wollongong, NSW, Australia, January 2008. CRPIT, pp. 65\u201373. Australian Computer Society (2008)"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2019"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-29959-0_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T00:06:36Z","timestamp":1726358796000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-29959-0_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030299583","9783030299590"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-29959-0_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"15 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/conf.laas.fr\/esorics\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"344","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"67","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}