{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,10]],"date-time":"2026-05-10T00:10:35Z","timestamp":1778371835534,"version":"3.51.4"},"publisher-location":"Cham","reference-count":65,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030559571","type":"print"},{"value":"9783030559588","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-55958-8_4","type":"book-chapter","created":{"date-parts":[[2021,5,9]],"date-time":"2021-05-09T19:03:36Z","timestamp":1620587016000},"page":"66-86","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["You\u2019ve Left Me No Choices: Security Economics to Inform Behaviour Intervention Support in Organizations"],"prefix":"10.1007","author":[{"given":"Albes\u00eb","family":"Demjaha","sequence":"first","affiliation":[]},{"given":"Simon","family":"Parkin","sequence":"additional","affiliation":[]},{"given":"David","family":"Pym","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,10]]},"reference":[{"issue":"6","key":"4_CR1","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MSP.2009.163","volume":"7","author":"A Acquisti","year":"2009","unstructured":"Acquisti, A.: Nudging privacy: the behavioral economics of personal information. IEEE Secur. Priv. 7(6), 82\u201385 (2009)","journal-title":"IEEE Secur. Priv."},{"key":"4_CR2","first-page":"363","volume":"18","author":"A Acquisti","year":"2007","unstructured":"Acquisti, A., Grossklags, J.: What can behavioral economics teach us about privacy. Digital Priv. Theory Technol. Practices 18, 363\u2013377 (2007)","journal-title":"Digital Priv. Theory Technol. Practices"},{"issue":"3","key":"4_CR3","doi-asserted-by":"publisher","first-page":"613","DOI":"10.2307\/25750694","volume":"34","author":"CL Anderson","year":"2010","unstructured":"Anderson, C.L., Agarwal, R.: Practicing safe computing: a multimedia empirical examination of home computer user security behavioral intentions. MISQ 34(3), 613\u2013643 (2010)","journal-title":"MISQ"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Ashenden, D., Lawrence, D.: Can we sell security like soap?: a new approach to behaviour change. In: Proceedings of the 2013 New Security Paradigms Workshop, pp. 87\u201394. ACM (2013)","DOI":"10.1145\/2535813.2535823"},{"issue":"3","key":"4_CR5","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MSP.2016.57","volume":"14","author":"D Ashenden","year":"2016","unstructured":"Ashenden, D., Lawrence, D.: Security dialogues: building better relationships between security and business. IEEE Secur. Priv. 14(3), 82\u201387 (2016)","journal-title":"IEEE Secur. Priv."},{"key":"4_CR6","unstructured":"Baddeley, M.: Information security: lessons from behavioural economics. In: Workshop on the Economics of Information Security (2011)"},{"key":"4_CR7","volume-title":"Dictionary of Economics","author":"H Bateman","year":"2003","unstructured":"Bateman, H., McAdam, K.: Dictionary of Economics. A & C Black Publishers Ltd., London (2003)"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Beautement, A., Sasse, M.A., Wonham, M.: The compliance budget: managing security behaviour in organisations. In: Proceedings of the 2008 Workshop on New Security Paradigms, pp. 47\u201358. ACM (2009)","DOI":"10.1145\/1595676.1595684"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Benenson, Z., Lenzini, G., Oliveira, D., Parkin, S., Uebelacker, S.: Maybe poor johnny really cannot encrypt: the case for a complexity theory for usable security. In: Proceedings of the 2015 New Security Paradigms Workshop, pp. 85\u201399. ACM (2015)","DOI":"10.1145\/2841113.2841120"},{"issue":"1","key":"4_CR10","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1093\/iwc\/iwx017","volume":"30","author":"O Bergman","year":"2017","unstructured":"Bergman, O., Whittaker, S.: The cognitive costs of upgrades. Interact. Comput. 30(1), 46\u201352 (2017)","journal-title":"Interact. Comput."},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Beris, O., Beautement, A., Sasse, M.A.: Employee rule breakers, excuse makers and security champions: mapping the risk perceptions and emotions that drive security behaviors. In: Proceedings of the 2015 New Security Paradigms Workshop, pp. 73\u201384. ACM (2015)","DOI":"10.1145\/2841113.2841119"},{"issue":"5","key":"4_CR12","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MSP.2013.110","volume":"11","author":"J Blythe","year":"2013","unstructured":"Blythe, J., Koppel, R., Smith, S.W.: Circumvention of security: good users do bad things. IEEE Secur. Priv. 11(5), 80\u201383 (2013)","journal-title":"IEEE Secur. Priv."},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Briggs, P., Jeske, D., Coventry, L.: Behavior change interventions for cybersecurity. In: Behavior Change Interventions for Cybersecurity, pp. 115\u2013136 (2017)","DOI":"10.1016\/B978-0-12-802690-8.00004-9"},{"key":"4_CR14","volume-title":"Economics of Information Security","author":"LJ Camp","year":"2006","unstructured":"Camp, L.J., Lewis, S.: Economics of Information Security, vol. 12. Springer Science & Business Media, Berlin (2006)"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Caraban, A., Karapanos, E., Gon\u00e7alves, D., Campos, P.: 23 ways to nudge: a review of technology-mediated nudging in human-computer interaction (2019)","DOI":"10.1145\/3290605.3300733"},{"issue":"5","key":"4_CR16","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MSP.2015.97","volume":"13","author":"T Caulfield","year":"2015","unstructured":"Caulfield, T., Pym, D.: Improving security policy decisions with models. IEEE Secur. Priv. 13(5), 34\u201341 (2015)","journal-title":"IEEE Secur. Priv."},{"key":"4_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/978-3-319-07620-1_21","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"T Caulfield","year":"2014","unstructured":"Caulfield, T., Pym, D., Williams, J.: Compositional security modelling. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 233\u2013245. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-07620-1_21"},{"key":"4_CR18","unstructured":"Collinson, M., Monahan, B., Pym, D.: A Discipline of Mathematical Systems Modelling. College Publications (2012)"},{"key":"4_CR19","unstructured":"Das, S., Dabbish, L.A., Hong, J.I.: A typology of perceived triggers for end-user security and privacy behaviors (2019)"},{"key":"4_CR20","doi-asserted-by":"publisher","DOI":"10.4324\/9781315251271","volume-title":"Just Culture: Balancing Safety and Accountability","author":"S Dekker","year":"2016","unstructured":"Dekker, S.: Just Culture: Balancing Safety and Accountability. CRC Press, United States (2016)"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Demjaha, A., Caulfield, T., Sasse, M.A., Pym, D.: 2 fast 2 secure: a case study of post-breach security changes (2019)","DOI":"10.1109\/EuroSPW.2019.00028"},{"issue":"6","key":"4_CR22","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/s00779-004-0308-5","volume":"8","author":"P Dourish","year":"2004","unstructured":"Dourish, P., Grinter, E., Delgado De La Flor, J., Joseph, M.: Security in the wild: user strategies for managing security as an everyday, practical problem. Pers. Ubiquit. Comput. 8(6), 391\u2013401 (2004)","journal-title":"Pers. Ubiquit. Comput."},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Dutson, J., Allen, D., Eggett, D., Seamons, K.: \u201cDon\u2019t punish all of us\u201d: measuring user attitudes about two-factor authentication. In: EuroUSEC, vol. 2019 (2019)","DOI":"10.1109\/EuroSPW.2019.00020"},{"key":"4_CR24","volume-title":"Dictionary of Business and Economic Terms","author":"JP Friedman","year":"2012","unstructured":"Friedman, J.P.: Dictionary of Business and Economic Terms. Simon and Schuster, New York (2012)"},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"Frik, A., Malkin, N., Harbach, M., Peer, E., Egelman, S.: A promise is a promise: the effect of commitment devices on computer security intentions. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, p. 604. ACM (2019)","DOI":"10.1145\/3290605.3300834"},{"issue":"4","key":"4_CR26","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1145\/581271.581274","volume":"5","author":"LA Gordon","year":"2002","unstructured":"Gordon, L.A., Loeb, M.P.: The economics of information security investment. ACM Trans. Inf. Syst. Secur. (TISSEC) 5(4), 438\u2013457 (2002)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"4_CR27","unstructured":"Grossklags, J., Acquisti, A.: When 25 cents is too much: an experiment on willingness-to-sell and willingness-to-protect personal information. In: WEIS (2007)"},{"key":"4_CR28","doi-asserted-by":"crossref","unstructured":"Herley, C.: So long, and no thanks for the externalities: the rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop, pp. 133\u2013144. ACM (2009)","DOI":"10.1145\/1719030.1719050"},{"issue":"1","key":"4_CR29","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MSP.2013.134","volume":"12","author":"C Herley","year":"2013","unstructured":"Herley, C.: More is not the answer. IEEE Secur. Priv. 12(1), 14\u201319 (2013)","journal-title":"IEEE Secur. Priv."},{"key":"4_CR30","first-page":"40","volume":"2005","author":"R Horne","year":"2005","unstructured":"Horne, R., et al.: Concordance, adherence and compliance in medicine taking. London: NCCSDO 2005, 40\u20136 (2005)","journal-title":"London: NCCSDO"},{"key":"4_CR31","unstructured":"Information Security Forum: From promoting awareness to embedding behaviours: Secure by choice, not by chance (2014)"},{"issue":"2","key":"4_CR32","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1016\/j.ejor.2011.05.050","volume":"216","author":"C Ioannidis","year":"2012","unstructured":"Ioannidis, C., Pym, D., Williams, J.: Information security trade-offs and optimal patching policies. Eur. J. Oper. Res. 216(2), 434\u2013444 (2012)","journal-title":"Eur. J. Oper. Res."},{"issue":"2","key":"4_CR33","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1007\/s11002-012-9186-1","volume":"23","author":"EJ Johnson","year":"2012","unstructured":"Johnson, E.J., et al.: Beyond nudges: tools of a choice architecture. Market. Lett. 23(2), 487\u2013504 (2012)","journal-title":"Market. Lett."},{"key":"4_CR34","doi-asserted-by":"crossref","unstructured":"Kahneman, D., Tversky, A.: Prospect theory: an analysis of decision under risk. In: Handbook of the Fundamentals of Financial Decision Making: Part I, pp. 99\u2013127. World Scientific (2013)","DOI":"10.1142\/9789814417358_0006"},{"issue":"3","key":"4_CR35","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1108\/ICS-11-2016-0084","volume":"25","author":"F Karlsson","year":"2017","unstructured":"Karlsson, F., Karlsson, M., \u00c5str\u00f6m, J.: Measuring employees\u2019 compliance-the importance of value pluralism. Inf. Comput. Secur. 25(3), 279\u2013299 (2017)","journal-title":"Inf. Comput. Secur."},{"key":"4_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/978-3-642-41320-9_5","volume-title":"Financial Cryptography and Data Security","author":"I Kirlappos","year":"2013","unstructured":"Kirlappos, I., Beautement, A., Sasse, M.A.: \u201cComply or Die\u201d is dead: long live security-aware principal agents. In: Adams, A.A., Brenner, M., Smith, M. (eds.) FC 2013. LNCS, vol. 7862, pp. 70\u201382. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-41320-9_5"},{"key":"4_CR37","doi-asserted-by":"crossref","unstructured":"Kirlappos, I., Parkin, S., Sasse, M.A.: Learning from \u201cshadow security\": why understanding non-compliance provides the basis for effective security. In: Workshop on Usable Security (USEC) 2014 (2014)","DOI":"10.14722\/usec.2014.23007"},{"issue":"4","key":"4_CR38","first-page":"215","volume":"15","author":"R Koppel","year":"2015","unstructured":"Koppel, R., Smith, S.W., Blythe, J., Kothari, V.H.: Workarounds to computer access in healthcare organizations: you want my password or a dead patient? ITCH 15(4), 215\u2013220 (2015)","journal-title":"ITCH"},{"key":"4_CR39","unstructured":"Mankiw, N., Taylor, M.: Microeconomics: thomson learning (2006)"},{"key":"4_CR40","unstructured":"Mathur, A., Engel, J., Sobti, S., Chang, V., Chetty, M.: \u201cThey keep coming back like zombies\": improving software updating interfaces. In: Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), pp. 43\u201358 (2016)"},{"issue":"1","key":"4_CR41","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1186\/1748-5908-6-42","volume":"6","author":"S Michie","year":"2011","unstructured":"Michie, S., Van Stralen, M.M., West, R.: The behaviour change wheel: a new method for characterising and designing behaviour change interventions. Implementation Sci. 6(1), 42 (2011)","journal-title":"Implementation Sci."},{"key":"4_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-319-11851-2_8","volume-title":"Security and Trust Management","author":"C Morisset","year":"2014","unstructured":"Morisset, C., Yevseyeva, I., Gro\u00df, T., van Moorsel, A.: A formal model for soft enforcement: influencing the decision-maker. In: Mauw, S., Jensen, C.D. (eds.) STM 2014. LNCS, vol. 8743, pp. 113\u2013128. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-11851-2_8"},{"key":"4_CR43","doi-asserted-by":"crossref","unstructured":"Morris, J., Becker, I., Parkin, S.: In control with no control: perceptions and reality of windows 10 home edition update features (2019)","DOI":"10.14722\/usec.2019.23008"},{"key":"4_CR44","doi-asserted-by":"crossref","unstructured":"Pallas, F.: Information security inside organizations-a positive model and some normative arguments based on new institutional economics. TU Berlin - Information Systems Engineering (2009)","DOI":"10.2139\/ssrn.1471801"},{"key":"4_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-319-29938-9_2","volume-title":"Technology and Practice of Passwords","author":"S Parkin","year":"2016","unstructured":"Parkin, S., Driss, S., Krol, K., Sasse, M.A.: Assessing the user experience of password reset policies in a university. In: Stajano, F., Mj\u00f8lsnes, S.F., Jenkinson, G., Thorsheim, P. (eds.) PASSWORDS 2015. LNCS, vol. 9551, pp. 21\u201338. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-29938-9_2"},{"key":"4_CR46","doi-asserted-by":"crossref","unstructured":"Parkin, S., Fielder, A., Ashby, A.: Pragmatic security: modelling it security management responsibilities for SME archetypes. In: Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, pp. 69\u201380. ACM (2016)","DOI":"10.1145\/2995959.2995967"},{"key":"4_CR47","doi-asserted-by":"crossref","unstructured":"Parkin, S., van Moorsel, A., Inglesant, P., Sasse, M.A.: A stealth approach to usable security: helping it security managers to identify workable security solutions. In: Proceedings of the 2010 New Security Paradigms Workshop. NSPW 2010, pp. 33\u201350. ACM (2010)","DOI":"10.1145\/1900546.1900553"},{"key":"4_CR48","doi-asserted-by":"crossref","unstructured":"Parkin, S., Redmiles, E.M., Coventry, L., Sasse, M.A.: Security when it is welcome: exploring device purchase as an opportune moment for security behavior change. In: Proceedings of the Workshop on Usable Security and Privacy (USEC 2019). Internet Society (2019)","DOI":"10.14722\/usec.2019.23024"},{"key":"4_CR49","doi-asserted-by":"crossref","unstructured":"Raja, F., Hawkey, K., Jaferian, P., Beznosov, K., Booth, K.S.: It\u2019s too complicated, so I turned it off!: expectations, perceptions, and misconceptions of personal firewalls. In: Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, pp. 53\u201362. ACM (2010)","DOI":"10.1145\/1866898.1866907"},{"key":"4_CR50","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139062367","volume-title":"Human Error","author":"J Reason","year":"1990","unstructured":"Reason, J.: Human Error. Cambridge University Press, Cambridge (1990)"},{"key":"4_CR51","doi-asserted-by":"crossref","unstructured":"Redmiles, E.M., Mazurek, M.L., Dickerson, J.P.: Dancing pigs or externalities?: measuring the rationality of security decisions. In: Proceedings of the 2018 ACM Conference on Economics and Computation, pp. 215\u2013232. ACM (2018)","DOI":"10.1145\/3219166.3219185"},{"issue":"5","key":"4_CR52","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/MSP.2017.3681050","volume":"15","author":"R Reeder","year":"2017","unstructured":"Reeder, R., Ion, I., Consolvo, S.: 152 simple steps to stay safe online: security advice for non-tech-savvy users. IEEE Secur. Priv. 15(5), 55\u201364 (2017)","journal-title":"IEEE Secur. Priv."},{"key":"4_CR53","doi-asserted-by":"crossref","unstructured":"Reinfelder, L., Landwirth, R., Benenson, Z.: Security managers are not the enemy either. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, p. 433. ACM (2019)","DOI":"10.1145\/3290605.3300663"},{"key":"4_CR54","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/978-3-319-07620-1_32","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"K Renaud","year":"2014","unstructured":"Renaud, K., Goucher, W.: The curious incidence of security breaches by knowledgeable employees and the pivotal role a of security culture. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 361\u2013372. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-07620-1_32"},{"key":"4_CR55","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.ijhcs.2018.05.011","volume":"120","author":"K Renaud","year":"2018","unstructured":"Renaud, K., Zimmermann, V.: Ethical guidelines for nudging in information security & privacy. Int. J. Hum Comput Stud. 120, 22\u201335 (2018)","journal-title":"Int. J. Hum Comput Stud."},{"key":"4_CR56","unstructured":"Richard, H., Thaler, C.R.S.: Nudge: improving decisions about health, wealth, and happiness (2008)"},{"key":"4_CR57","doi-asserted-by":"publisher","DOI":"10.1515\/9781400845347","volume-title":"The Behavioral Foundations of Public Policy","author":"E Shafir","year":"2013","unstructured":"Shafir, E.: The Behavioral Foundations of Public Policy. Princeton University Press, New Jersey (2013)"},{"issue":"2","key":"4_CR58","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1037\/h0042769","volume":"63","author":"HA Simon","year":"1956","unstructured":"Simon, H.A.: Rational choice and the structure of the environment. Psychol. Rev. 63(2), 129 (1956)","journal-title":"Psychol. Rev."},{"key":"4_CR59","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/4711.001.0001","volume-title":"Models of Bounded Rationality: Empirically Grounded Economic Reason","author":"HA Simon","year":"1997","unstructured":"Simon, H.A.: Models of Bounded Rationality: Empirically Grounded Economic Reason, vol. 3. MIT Press, United States (1997)"},{"issue":"1","key":"4_CR60","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/0167-2681(80)90051-7","volume":"1","author":"R Thaler","year":"1980","unstructured":"Thaler, R.: Toward a positive theory of consumer choice. J. Econ. Behav. Organ. 1(1), 39\u201360 (1980)","journal-title":"J. Econ. Behav. Organ."},{"key":"4_CR61","doi-asserted-by":"crossref","unstructured":"Turland, J., Coventry, L., Jeske, D., Briggs, P., van Moorsel, A.: Nudging towards security: developing an application for wireless network selection for android phones. In: Proceedings of the 2015 British HCI Conference, pp. 193\u2013201. ACM (2015)","DOI":"10.1145\/2783446.2783588"},{"key":"4_CR62","doi-asserted-by":"crossref","unstructured":"Vaniea, K.E., Rader, E., Wash, R.: Betrayed by updates: how negative experiences affect future security. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2671\u20132674. ACM (2014)","DOI":"10.1145\/2556288.2557275"},{"key":"4_CR63","volume-title":"A Prospect Theory Approach to Security","author":"V Verendel","year":"2008","unstructured":"Verendel, V.: A Prospect Theory Approach to Security. Chalmers University of Technology, Sweden (2008)"},{"key":"4_CR64","doi-asserted-by":"crossref","unstructured":"Vohs, K.D., Baumeister, R.F., Schmeichel, B.J., Twenge, J.M., Nelson, N.M., Tice, D.M.: Making choices impairs subsequent self-control: a limited-resource account of decision making, self-regulation, and active initiative (2014)","DOI":"10.1037\/2333-8113.1.S.19"},{"key":"4_CR65","unstructured":"Wash, R., Rader, E., Vaniea, K., Rizor, M.: Out of the loop: how automated software updates cause unintended security consequences. In: 10th Symposium On Usable Privacy and Security (SOUPS 2014), pp. 89\u2013104 (2014)"}],"container-title":["Lecture Notes in Computer Science","Socio-Technical Aspects in Security and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-55958-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,10]],"date-time":"2026-05-10T00:03:08Z","timestamp":1778371388000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-55958-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030559571","9783030559588"],"references-count":65,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-55958-8_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"10 May 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"STAST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Socio-Technical Aspects in Security and Trust","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"stast2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/stast2019.uni.lu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,75","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}