{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T04:29:53Z","timestamp":1754195393294,"version":"3.40.3"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030582005"},{"type":"electronic","value":"9783030582012"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-58201-2_8","type":"book-chapter","created":{"date-parts":[[2020,9,13]],"date-time":"2020-09-13T23:02:29Z","timestamp":1600038149000},"page":"109-123","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Facilitating Privacy Attitudes and Behaviors with Affective Visual Design"],"prefix":"10.1007","author":[{"given":"Agnieszka","family":"Kitkowska","sequence":"first","affiliation":[]},{"given":"Yefim","family":"Shulman","sequence":"additional","affiliation":[]},{"given":"Leonardo A.","family":"Martucci","sequence":"additional","affiliation":[]},{"given":"Erik","family":"W\u00e4stlund","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,14]]},"reference":[{"issue":"6221","key":"8_CR1","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.aaa1465","volume":"347","author":"A Acquisti","year":"2015","unstructured":"Acquisti, A., Brandimarte, L., Loewenstein, G.: Privacy and human behavior in the age of information. Science 347(6221), 509\u2013514 (2015)","journal-title":"Science"},{"issue":"1","key":"8_CR2","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1108\/09685221211219155","volume":"20","author":"J Angulo","year":"2012","unstructured":"Angulo, J., Fischer-H\u00fcbner, S., W\u00e4stlund, E., Pulls, T.: Towards usable privacy policy display and management. Inf. Manag. Comput. Secur. 20(1), 4\u201317 (2012)","journal-title":"Inf. Manag. Comput. Secur."},{"key":"8_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1007\/978-3-319-07293-7_45","volume-title":"HCI in Business","author":"G Bente","year":"2014","unstructured":"Bente, G., Dratsch, T., Rehbach, S., Reyl, M., Lushaj, B.: Do you trust my avatar? Effects of photo-realistic seller avatars and reputation scores on trust in online transactions. In: Nah, F.F.H. (ed.) HCIB 2014. LNCS, vol. 8527, pp. 461\u2013470. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-07293-7_45"},{"issue":"3","key":"8_CR4","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1177\/1948550612455931","volume":"4","author":"L Brandimarte","year":"2013","unstructured":"Brandimarte, L., Acquisti, A., Loewenstein, G.: Misplaced confidences: privacy and the control paradox. Soc. Psychol. Pers. Sci. 4(3), 340\u2013347 (2013)","journal-title":"Soc. Psychol. Pers. Sci."},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Carmines, E., Zeller, R.: Reliability and Validity Assessment, vol. 17. Sage Publications (1979)","DOI":"10.4135\/9781412985642"},{"key":"8_CR6","unstructured":"Clore, G., Gasper, K., Garvin, E.: Affect as information. In: Handbook of Affect and Social Cognition, pp. 121\u2013144 (2001)"},{"issue":"4","key":"8_CR7","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1515\/popets-2017-0040","volume":"2017","author":"KP Coopamootoo","year":"2017","unstructured":"Coopamootoo, K.P., Gro\u00df, T.: Why privacy is all but forgotten: an empirical study of privacy & sharing attitude. Proc. Priv. Enhancing Technol. 2017(4), 97\u2013118 (2017)","journal-title":"Proc. Priv. Enhancing Technol."},{"issue":"4","key":"8_CR8","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1287\/isre.2015.0600","volume":"26","author":"T Dinev","year":"2015","unstructured":"Dinev, T., Mcconnell, A., Smith, H.: Informing privacy research through information systems, psychology, and behavioral economics: thinking outside the \u201cAPCO\" box. Inf. Syst. Res. 26(4), 639\u2013655 (2015)","journal-title":"Inf. Syst. Res."},{"issue":"2","key":"8_CR9","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1037\/1040-3590.18.2.192","volume":"18","author":"M Donnellan","year":"2006","unstructured":"Donnellan, M., Oswald, F., Baird, B., Lucas, R.: The mini-IPIP scales: tiny-yet-effective measures of the big five factors of personality. Psychol. Assess. 18(2), 192\u2013203 (2006)","journal-title":"Psychol. Assess."},{"issue":"1","key":"8_CR10","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1145\/2738210.2738215","volume":"45","author":"S Egelman","year":"2015","unstructured":"Egelman, S., Peer, E.: Predicting privacy and security attitudes. ACM SIGCAS Comput. Soc. Newsl. 45(1), 22\u201328 (2015)","journal-title":"ACM SIGCAS Comput. Soc. Newsl."},{"key":"8_CR11","unstructured":"European Commission: Regulation (EU) 2016\/679 Of The European Parliament and Of The Council of 27 April 2016. Official Journal of the European Union (2016)"},{"issue":"1","key":"8_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/(SICI)1099-0771(200001\/03)13:1<1::AID-BDM333>3.0.CO;2-S","volume":"13","author":"M Finucane","year":"2000","unstructured":"Finucane, M., Alhakami, A., Slovic, P., Johnson, S.: The affect heuristic in judgments of risks and benefits. J. Behav. Decis. Mak. 13(1), 1\u201317 (2000)","journal-title":"J. Behav. Decis. Mak."},{"key":"8_CR13","unstructured":"Gliem, J.A., Gliem, R.R.: Calculating, interpreting, and reporting Cronbach\u2019s alpha reliability coefficient for likert-type scales. In: Midwest Research-to-Practice Conference in Adult, Continuing, and Community Education (2003)"},{"key":"8_CR14","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.chb.2013.07.055","volume":"30","author":"E Hollenbaugh","year":"2014","unstructured":"Hollenbaugh, E., Ferris, A.: Facebook self-disclosure: examining the role of traits, social cohesion, and motives. Comput. Hum. Behav. 30, 50\u201358 (2014)","journal-title":"Comput. Hum. Behav."},{"issue":"2","key":"8_CR15","first-page":"53","volume":"3","author":"S Jenkins","year":"2009","unstructured":"Jenkins, S., Brown, R., Rutterford, N.: Comparing thermographic, EEG, and subjective measures of affective experience during simulated product interactions. Int. J. Des. 3(2), 53\u201365 (2009)","journal-title":"Int. J. Des."},{"issue":"5","key":"8_CR16","doi-asserted-by":"publisher","first-page":"2158","DOI":"10.1016\/j.chb.2007.10.005","volume":"24","author":"A Joinson","year":"2008","unstructured":"Joinson, A., Paine, C., Buchanan, T., Reips, U.: Measuring self-disclosure online: blurring and non-response to sensitive items in web-based surveys. Comput. Hum. Behav. 24(5), 2158\u20132171 (2008)","journal-title":"Comput. Hum. Behav."},{"key":"8_CR17","unstructured":"Junglas, I., Spitzm\u00fcller, C.: Personality traits and privacy perceptions: an empirical study in the context of location-based services. In: International Conference on Mobile Business, ICMB 2006, pp. 387\u2013402 (2006)"},{"issue":"4","key":"8_CR18","first-page":"7","volume":"3","author":"D Kahneman","year":"2003","unstructured":"Kahneman, D.: A perspective on judgment and choice. Am. Psychol. 3(4), 7\u201318 (2003)","journal-title":"Am. Psychol."},{"issue":"6","key":"8_CR19","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1111\/isj.12062","volume":"25","author":"F Kehr","year":"2015","unstructured":"Kehr, F., Kowatsch, T., Wentzel, D., Fleisch, E.: Blissfully ignorant: the effects of general privacy concerns, general institutional trust, and affect in the privacy calculus. Inf. Syst. J. 25(6), 607\u2013635 (2015)","journal-title":"Inf. Syst. J."},{"issue":"3","key":"8_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2499670","volume":"3","author":"B Knijnenburg","year":"2013","unstructured":"Knijnenburg, B., Kobsa, A.: Making decisions about privacy: information disclosure in context-aware recommender systems. ACM Trans. Interact. Intell. Syst. 3(3), 1\u201323 (2013)","journal-title":"ACM Trans. Interact. Intell. Syst."},{"key":"8_CR21","unstructured":"Krasnova, H., Kolesnikova, E., Guenther, O.: \u201cIt won\u2019t happen to me!\u201d: self-disclosure in online social networks. In: AMCIS 2009 Proceedings, p. 343 (2009)"},{"issue":"3","key":"8_CR22","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1016\/j.dss.2011.01.017","volume":"51","author":"H Li","year":"2011","unstructured":"Li, H., Sarathy, R., Xu, H.: The role of affect and cognition on online consumers\u2019 decision to disclose personal information to unfamiliar online vendors. Decis. Support Syst. 51(3), 434\u2013445 (2011)","journal-title":"Decis. Support Syst."},{"issue":"4","key":"8_CR23","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1287\/isre.1040.0032","volume":"15","author":"N Malhotra","year":"2004","unstructured":"Malhotra, N., Kim, S., Agarwal, J.: Internet users\u2019 information privacy concerns (IUIPC): the construct, the scale, and a causal model. Inf. Syst. Res. 15(4), 336\u2013355 (2004)","journal-title":"Inf. Syst. Res."},{"issue":"2","key":"8_CR24","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1057\/ejis.2013.17","volume":"23","author":"C Miltgen","year":"2014","unstructured":"Miltgen, C., Peyrat-Guillard, D.: Cultural and generational influences on privacy concerns: a qualitative study in seven European countries. Eur. J. Inf. Syst. 23(2), 103\u2013125 (2014)","journal-title":"Eur. J. Inf. Syst."},{"key":"8_CR25","unstructured":"Monteleone, S., van Bavel, R., Rodr\u00edguez-Priego, N., Esposito, G.: Nudges to privacy behaviour: exploring an alternative approach to privacy notices. Technical report, European Commission (2015)"},{"issue":"3","key":"8_CR26","first-page":"105","volume":"7","author":"E Noll Webb","year":"2012","unstructured":"Noll Webb, E., Balasubramanian, G., \u00d3\u2019Broin, U., Webb, J.: Wham! pow! comics as user assistance. J. Usability Stud. 7(3), 105\u2013117 (2012)","journal-title":"J. Usability Stud."},{"issue":"1","key":"8_CR27","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1080\/1369118X.2018.1486870","volume":"23","author":"JA Obar","year":"2018","unstructured":"Obar, J.A., Oeldorf-Hirsch, A.: The biggest lie on the Internet: ignoring the privacy policies and terms of service policies of social networking services. Inf. Commun. Soc. 23(1), 128\u2013147 (2018)","journal-title":"Inf. Commun. Soc."},{"key":"8_CR28","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-642-39498-0_9","volume-title":"The Economics of Information Security and Privacy","author":"S Preibusch","year":"2013","unstructured":"Preibusch, S., Krol, K., Beresford, A.R.: The privacy eonomics of voluntary over-disclosure in web forms. In: B\u00f6hme, R. (ed.) The Economics of Information Security and Privacy, pp. 183\u2013209. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39498-0_9"},{"issue":"1","key":"8_CR29","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1177\/1523422314559804","volume":"17","author":"J Reio","year":"2015","unstructured":"Reio, J., Thomas, G., Shuck, B.: Exploratory factor analysis: implications for theory, research, and practice. Adv. Dev. Hum. Resour. 17(1), 12\u201325 (2015)","journal-title":"Adv. Dev. Hum. Resour."},{"key":"8_CR30","first-page":"176","volume":"36","author":"W Schnotz","year":"2007","unstructured":"Schnotz, W., K\u00fc, C.: External and internal representations in the acquisition and use of knowledge: visualization effects on mental model construction. Instr. Sci. 36, 176\u2013190 (2007)","journal-title":"Instr. Sci."},{"issue":"January","key":"8_CR31","first-page":"289","volume":"1","author":"N Schwarz","year":"2012","unstructured":"Schwarz, N.: Feelings-as-information theory. Handb. Theor. Soc. Psychol. 1(January), 289\u2013308 (2012)","journal-title":"Handb. Theor. Soc. Psychol."},{"key":"8_CR32","unstructured":"Shadish, W.R., Cook, T.D., Campbell, D.T.: Experimental and quasi-experimental designs for generalized causal inference (2002)"},{"key":"8_CR33","doi-asserted-by":"crossref","unstructured":"Sheth, S., Kaiser, G., Maalej, W.: Us and them: a study of privacy requirements across North America, Asia, and Europe. In: Proceedings of the 36th ICSE, pp. 859\u2013870 (2014)","DOI":"10.1145\/2568225.2568244"},{"key":"8_CR34","doi-asserted-by":"crossref","unstructured":"Slovic, P.: The affect heuristic. In: Heuristics and Biases; The Psychology of Intuitive Judgement, pp. 397\u2013420. Cambridge University Press (2002)","DOI":"10.1017\/CBO9780511808098.025"},{"issue":"5","key":"8_CR35","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1017\/S0140525X00003435","volume":"23","author":"KE Stanovich","year":"2000","unstructured":"Stanovich, K.E., West, R.F.: Individual differences in reasoning: implications for the rationality debate? Behav. Brain Sci. 23(5), 645\u2013665 (2000)","journal-title":"Behav. Brain Sci."},{"key":"8_CR36","doi-asserted-by":"crossref","unstructured":"Sutcliffe, A., Namoune, A.: Getting the message across: visual attention, aesthetic design and what users remember. In: Proceedings of the 7th ACM Conference on Designing Interactive Systems, pp. 11\u201320. ACM (2008)","DOI":"10.1145\/1394445.1394447"},{"key":"8_CR37","doi-asserted-by":"crossref","unstructured":"Tabassum, M., Alqhatani, A., Aldossari, M., Richter Lipford, H.: Increasing user attention with a comic-based policy. In: CHI 2018. ACM (2018)","DOI":"10.1145\/3173574.3173774"},{"key":"8_CR38","doi-asserted-by":"crossref","unstructured":"Tasse, D., Ankolekar, A., Hailpern, J.: Getting users\u2019 attention in web apps in likable, minimally annoying ways. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pp. 3324\u20133334 (2016)","DOI":"10.1145\/2858036.2858174"},{"key":"8_CR39","doi-asserted-by":"crossref","unstructured":"Waddell, T., Auriemma, J., Sundar, S.: Make it simple, or force users to read? paraphrased design improves comprehension of end user license agreements. In: CHI 2016, p. 4 (2016)","DOI":"10.1145\/2858036.2858149"},{"issue":"1","key":"8_CR40","doi-asserted-by":"publisher","first-page":"43","DOI":"10.4304\/tpls.2.1.43-53","volume":"2","author":"M Zamanian","year":"2012","unstructured":"Zamanian, M., Heydari, P.: Readability of texts: state of the art. Theory Pract. Lang. Stud. 2(1), 43\u201353 (2012)","journal-title":"Theory Pract. Lang. Stud."}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58201-2_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,14]],"date-time":"2024-09-14T00:06:21Z","timestamp":1726272381000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-58201-2_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030582005","9783030582012"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58201-2_8","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"14 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Maribor","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Slovenia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"35","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sec2020.um.si\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"149","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.88","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5.14","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}