{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T22:20:56Z","timestamp":1773526856438,"version":"3.50.1"},"publisher-location":"Cham","reference-count":96,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030984373","type":"print"},{"value":"9783030984380","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-98438-0_20","type":"book-chapter","created":{"date-parts":[[2022,3,21]],"date-time":"2022-03-21T00:02:30Z","timestamp":1647820950000},"page":"255-271","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Subliminal Warnings: Utilizing the High Bandwidth of Nonconscious Visual Perception"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3542-3989","authenticated-orcid":false,"given":"Feng","family":"Zhu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4627-9831","authenticated-orcid":false,"given":"Sandra","family":"Carpenter","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4838-853X","authenticated-orcid":false,"given":"Mini","family":"Zeng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,21]]},"reference":[{"key":"20_CR1","doi-asserted-by":"publisher","unstructured":"Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2006, p. 581 (2006). https:\/\/doi.org\/10.1145\/1124772.1124861","DOI":"10.1145\/1124772.1124861"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Wu, M., Miller, R.C., Garfinkel, S.L.: Do security toolbars actually prevent phishing attacks? In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Montr\u00e9al, Qu\u00e9bec, Canada (2006)","DOI":"10.1145\/1124772.1124863"},{"key":"20_CR3","doi-asserted-by":"publisher","unstructured":"Krol, K., Moroz, M., Sasse, M.A.: Don\u2019t work. Can\u2019t work? Why it\u2019s time to rethink security warnings. In: 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS), pp. 1\u20138 (2012). https:\/\/doi.org\/10.1109\/CRISIS.2012.6378951","DOI":"10.1109\/CRISIS.2012.6378951"},{"key":"20_CR4","unstructured":"Akhawe, D., Felt, A.P.: Alice in warning land: a large-scale field study of browser security warning effectiveness. In: Proceedings of the 22nd USENIX Security Symposium, pp. 257\u2013272 (2013)"},{"key":"20_CR5","doi-asserted-by":"publisher","unstructured":"Bravo-Lillo, C., et al.: Your attention please: designing security-decision UIs to make genuine risks harder to ignore. In: Proceedings of the Ninth Symposium on Usable Privacy and Security, SOUPS 2013, pp. 6:1\u20136:12 (2013). https:\/\/doi.org\/10.1145\/2501604.2501610","DOI":"10.1145\/2501604.2501610"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Egelman, S., Cranor, L.F., Hong, J.: You\u2019ve been warned: an empirical study of the effectiveness of web browser phishing warnings. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (2008)","DOI":"10.1145\/1357054.1357219"},{"key":"20_CR7","doi-asserted-by":"publisher","unstructured":"B\u00f6hme, R., Grossklags, J.: The security cost of cheap user interaction. In: Proceedings of the 2011 Workshop on New Security Paradigms Workshop - NSPW 2011, p. 67 (2011). https:\/\/doi.org\/10.1145\/2073276.2073284","DOI":"10.1145\/2073276.2073284"},{"key":"20_CR8","doi-asserted-by":"publisher","unstructured":"Herley, C.: So long, and no thanks for the externalities: the rational rejection of security advice by users. Security, 133\u2013144 (2009). https:\/\/doi.org\/10.1145\/1719030.1719050","DOI":"10.1145\/1719030.1719050"},{"key":"20_CR9","doi-asserted-by":"publisher","unstructured":"Zimmermann, M.: the nervous system in the context of information theory. Hum. Physiol., 166\u2013173 (1989). https:\/\/doi.org\/10.1007\/978-3-642-73831-9_7","DOI":"10.1007\/978-3-642-73831-9_7"},{"key":"20_CR10","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1016\/j.tics.2006.03.007","volume":"10","author":"S Dehaene","year":"2006","unstructured":"Dehaene, S., Changeux, J.P., Naccache, L., Sackur, J., Sergent, C.: Conscious, preconscious, and subliminal processing: a testable taxonomy. Trends Cogn. Sci. 10, 204\u2013211 (2006). https:\/\/doi.org\/10.1016\/j.tics.2006.03.007","journal-title":"Trends Cogn. Sci."},{"key":"20_CR11","doi-asserted-by":"publisher","first-page":"1445","DOI":"10.1126\/science.3629249","volume":"237","author":"J Kihlstrom","year":"1987","unstructured":"Kihlstrom, J.: The congnitive unconscious. Science 237, 1445\u20131452 (1987)","journal-title":"Science"},{"key":"20_CR12","doi-asserted-by":"publisher","unstructured":"Thorpe, S.J., Fize, D., Marlot, C.: Speed of processing in the human visual system (1996). https:\/\/doi.org\/10.1038\/381520a0","DOI":"10.1038\/381520a0"},{"key":"20_CR13","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1037\/a0015329","volume":"135","author":"E Van den Bussche","year":"2009","unstructured":"Van den Bussche, E., Van den Noortgate, W., Reynvoet, B.: Mechanisms of masked priming: a meta-analysis. Psychol. Bull. 135, 452\u2013477 (2009). https:\/\/doi.org\/10.1037\/a0015329","journal-title":"Psychol. Bull."},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Dijksterhuis, A., Aarts, H., Smith, P.K.: The power of the subliminal: on subliminal persuasion and other potential applications. In: The New Unconscious, pp. 77\u2013106 (2005)","DOI":"10.1093\/acprof:oso\/9780195307696.003.0005"},{"key":"20_CR15","unstructured":"Dhami, S.: The Foundations of Behavioral Economic Analysis. Oxford University Press, Oxford (2016)"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Spiekermann, S., Grossklags, J., Berendt, B.: E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior. In: Proceedings of the 3rd ACM Conference on Electronic Commerce, Tampa, Florida (2001)","DOI":"10.1145\/501158.501163"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Berendt, B., G\u00fcnther, O., Spiekermann, S.: Privacy in E-commerce: stated preferences vs. actual behavior. Commun. ACM. 48, 101\u2013106 (2005)","DOI":"10.1145\/1053291.1053295"},{"key":"20_CR18","doi-asserted-by":"publisher","unstructured":"Laughery, K.R., Wogalter, M.S.: Designing effective warnings. Rev. Hum. Factors Ergon., 241\u2013271 (2006). https:\/\/doi.org\/10.1177\/1557234X0600200109","DOI":"10.1177\/1557234X0600200109"},{"key":"20_CR19","unstructured":"Cranor, L.F.: A framework for reasoning about the human in the loop. In: Proceedings of the 1st Conference on Usability, Psychology, and Security, pp. 1:1--1:15 (2008)"},{"key":"20_CR20","doi-asserted-by":"publisher","DOI":"10.1201\/9781482289688","volume-title":"Handbook of Warnings","author":"MS Wogalter","year":"2006","unstructured":"Wogalter, M.S.: Handbook of Warnings. Lawrence Erlbaum Associates, Mahwah (2006)"},{"key":"20_CR21","doi-asserted-by":"publisher","unstructured":"Sunshine, J., Egelman, S., Almuhimedi, H., Atri, N., Cranor, L.F.: Crying wolf: an empirical study of SSL warning effectivenes. In: 18th USENIX Security Symposium, pp. 399\u2013432 (2009). https:\/\/doi.org\/10.1016\/S1353-4858(01)00916-3","DOI":"10.1016\/S1353-4858(01)00916-3"},{"key":"20_CR22","doi-asserted-by":"publisher","unstructured":"Zhang, B., Wu, M., Kang, H., Go, E., Sundar, S.S.: Effects of security warnings and instant gratification cues on attitudes toward mobile websites. In: Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems, CHI 2014, pp. 111\u2013114 (2014). https:\/\/doi.org\/10.1145\/2556288.2557347","DOI":"10.1145\/2556288.2557347"},{"key":"20_CR23","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MSP.2010.198","volume":"9","author":"C Bravo-Lillo","year":"2011","unstructured":"Bravo-Lillo, C., Cranor, L.F., Downs, J., Komanduri, S.: Bridging the gap in computer security warnings: a mental model approach. IEEE Secur. Priv. 9, 18\u201326 (2011). https:\/\/doi.org\/10.1109\/MSP.2010.198","journal-title":"IEEE Secur. Priv."},{"key":"20_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-642-23768-3_2","volume-title":"Human-Computer Interaction \u2013 INTERACT 2011","author":"C Bravo-Lillo","year":"2011","unstructured":"Bravo-Lillo, C., Cranor, L.F., Downs, J., Komanduri, S., Sleeper, M.: Improving computer security dialogs. In: Campos, P., Graham, N., Jorge, J., Nunes, N., Palanque, P., Winckler, M. (eds.) INTERACT 2011. LNCS, vol. 6949, pp. 18\u201335. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23768-3_2"},{"key":"20_CR25","doi-asserted-by":"publisher","first-page":"1612","DOI":"10.1518\/107118109X12524444080675","volume":"53","author":"S Kim","year":"2009","unstructured":"Kim, S., Wogalter, M.S.: Habituation, dishabituation, and recovery effects in visual warnings. Hum. Factors Ergon. Soc. Annu. Meet. Proc. 53, 1612\u20131616 (2009). https:\/\/doi.org\/10.1518\/107118109X12524444080675","journal-title":"Hum. Factors Ergon. Soc. Annu. Meet. Proc."},{"key":"20_CR26","doi-asserted-by":"publisher","unstructured":"Maurer, M.-E., De Luca, A., Kempe, S.: Using data type based security alert dialogs to raise online security awareness. In: Proceedings of the Seventh Symposium on Usable Privacy and Security - SOUPS 2011, p. 1 (2011). https:\/\/doi.org\/10.1145\/2078827.2078830","DOI":"10.1145\/2078827.2078830"},{"key":"20_CR27","doi-asserted-by":"publisher","first-page":"610","DOI":"10.1126\/science.1130992","volume":"314","author":"R Anderson","year":"2006","unstructured":"Anderson, R., Moore, T.: The economics of information security. Science 314, 610\u2013613 (2006)","journal-title":"Science"},{"key":"20_CR28","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1177\/1557234X0600200109","volume":"2","author":"KR Laughery","year":"2006","unstructured":"Laughery, K.R., Wogalter, M.S.: Designing effective warnings. Rev. Hum. Factors Ergon. 2, 241\u2013271 (2006). https:\/\/doi.org\/10.1177\/1557234X0600200109","journal-title":"Rev. Hum. Factors Ergon."},{"key":"20_CR29","doi-asserted-by":"crossref","unstructured":"Egelman, S., Schechter, S.: The Importance of Being Earnest [in Security Warnings] (2013)","DOI":"10.1007\/978-3-642-39884-1_5"},{"key":"20_CR30","doi-asserted-by":"publisher","unstructured":"Brustoloni, J.C., Villamar\u00edn-Salom\u00f3n, R.: Improving security decisions with polymorphic and audited dialogs. In: Proceedings of the 3rd Symposium on Usable Privacy and Security - SOUPS 2007, p. 76 (2007). https:\/\/doi.org\/10.1145\/1280680.1280691","DOI":"10.1145\/1280680.1280691"},{"key":"20_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1007\/978-3-642-03655-2_57","volume-title":"Human-Computer Interaction \u2013 INTERACT 2009","author":"F De Keukelaere","year":"2009","unstructured":"De Keukelaere, F., Yoshihama, S., Trent, S., Zhang, Y., Luo, L., Zurko, M.E.: Adaptive security dialogs for improved security behavior of users. In: Gross, T., et al. (eds.) INTERACT 2009. LNCS, vol. 5726, pp. 510\u2013523. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03655-2_57"},{"key":"20_CR32","unstructured":"Zeng, M., Zhu, F., Carpenter, S.: Eye gaze based dynamic warnings. In: 9th International Conference on Advances in Computer-Human Interactions (ACHI) I, pp. 204\u2013211 (2016)"},{"key":"20_CR33","unstructured":"Schneier, B.: Semantic Attacks: The Third Wave of Network Attacks (2000)"},{"key":"20_CR34","unstructured":"Sweeney, L.: Uniqueness of Simple Demographics in the U.S. Population. Carnegie Mellon University, Laboratory for International Data Privacy, Pittsburgh (2000)"},{"key":"20_CR35","doi-asserted-by":"crossref","unstructured":"Acquisti, A.: Privacy in electronic commerce and the economics of immediate gratification. In: 5th ACM Conference on Electronic Commerce, New York, NY (2004)","DOI":"10.1145\/988772.988777"},{"key":"20_CR36","doi-asserted-by":"crossref","unstructured":"Nguyen, D.H., et al.: Encountering SenseCam: personal recording technologies in everyday life. In: Proceedings of the 11th International Conference on Ubiquitous Computing, Orlando, Florida (2009)","DOI":"10.1145\/1620545.1620571"},{"key":"20_CR37","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1016\/j.pmcj.2011.06.007","volume":"8","author":"F Zhu","year":"2012","unstructured":"Zhu, F., Carpenter, S., Kulkarni, A.: Understanding identity exposure in pervasive computing environments. Pervasive Mob. Comput. 8, 777\u2013794 (2012)","journal-title":"Pervasive Mob. Comput."},{"key":"20_CR38","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MSP.2005.22","volume":"3","author":"A Acquisti","year":"2005","unstructured":"Acquisti, A., Grossklags, J.: Privacy and rationality in individual decision making. IEEE Secur. Priv. 3, 26\u201333 (2005)","journal-title":"IEEE Secur. Priv."},{"key":"20_CR39","unstructured":"March, J.G.: Risk Taking and Organizational Learning. ICOS, Ann Arbor (1994)"},{"key":"20_CR40","unstructured":"Lea, S., Fischer, P.: The psychology of scams: provoking and committing errors of judgement. Office of Fair Trading (2009)"},{"key":"20_CR41","unstructured":"The Behavioral Economics: Nudging Privacy (2009)"},{"key":"20_CR42","doi-asserted-by":"crossref","unstructured":"Acquisti, A., Leon, P.G.: Nudges for privacy and security: understanding and assisting users\u2019 choices online. ACM Comput. Surv. 50, 1\u201341 (2017)","DOI":"10.1145\/3054926"},{"key":"20_CR43","doi-asserted-by":"crossref","unstructured":"Wang, Y., Leon, P.G., Acquisti, A., Cranor, L.F., Forget, A., Sadeh, N.: A field trial of privacy nudges for Facebook. In: ACM CHI Conference on Human Factors in Computing Systems (CHI), pp. 2367\u20132376 (2014)","DOI":"10.1145\/2556288.2557413"},{"key":"20_CR44","doi-asserted-by":"publisher","unstructured":"Almuhimedi, H., et al.: Your location has been shared 5, 398 times! A field study on mobile app privacy nudging (2015). https:\/\/doi.org\/10.1145\/2702123.2702210","DOI":"10.1145\/2702123.2702210"},{"key":"20_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/978-3-642-40477-1_5","volume-title":"Human-Computer Interaction \u2013 INTERACT 2013","author":"E Choe","year":"2013","unstructured":"Choe, E., Jung, J., Lee, B., Fisher, K.: Nudging people away from privacy-invasive mobile apps through visual framing. In: Kotz\u00e9, P., Marsden, G., Lindgaard, G., Wesson, J., Winckler, M. (eds.) INTERACT 2013. LNCS, vol. 8119, pp. 74\u201391. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40477-1_5"},{"key":"20_CR46","first-page":"923","volume":"10","author":"E Selinger","year":"2011","unstructured":"Selinger, E., Whyte, K.: Is there a right way to nudge? Pract. Ethics Choice Archit. 10, 923\u2013935 (2011)","journal-title":"Pract. Ethics Choice Archit."},{"key":"20_CR47","doi-asserted-by":"publisher","unstructured":"Micallef, N., Just, M., Baillie, L.: Stop annoying me! An empirical investigation of the usability of app privacy notifications, pp. 371\u2013375 (2017). https:\/\/doi.org\/10.1145\/3152771.3156139","DOI":"10.1145\/3152771.3156139"},{"key":"20_CR48","doi-asserted-by":"crossref","unstructured":"Zhang, B., Xu, H.: Privacy nudges for mobile applications: effects on the creepiness emotion and privacy attitudes, pp. 1676\u20131690 (2016)","DOI":"10.1145\/2818048.2820073"},{"key":"20_CR49","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.tics.2006.10.012","volume":"11","author":"C Koch","year":"2007","unstructured":"Koch, C., Tsuchiya, N.: Attention and consciousness: two distinct brain processes. Trends Cogn. Sci. 11, 16\u201322 (2007). https:\/\/doi.org\/10.1016\/j.tics.2006.10.012","journal-title":"Trends Cogn. Sci."},{"key":"20_CR50","unstructured":"Bear, M.F., Connors, B.W., Paradiso, M.A.: Neuroscience. Lippincott Williams & Wilkins (2007)"},{"key":"20_CR51","doi-asserted-by":"publisher","first-page":"1762","DOI":"10.1016\/j.visres.2005.10.002","volume":"46","author":"H Kirchner","year":"2006","unstructured":"Kirchner, H., Thorpe, S.J.: Ultra-rapid object detection with saccadic eye movements: visual processing speed revisited. Vision. Res. 46, 1762\u20131776 (2006). https:\/\/doi.org\/10.1016\/j.visres.2005.10.002","journal-title":"Vision. Res."},{"key":"20_CR52","doi-asserted-by":"publisher","first-page":"857","DOI":"10.1098\/rstb.2007.2093","volume":"362","author":"S Kouider","year":"2007","unstructured":"Kouider, S., Dehaene, S.: Levels of processing during non-conscious perception: a critical review of visual masking. Philos. Trans. Royal Soc. B Biol. Sci. 362, 857\u2013875 (2007). https:\/\/doi.org\/10.1098\/rstb.2007.2093","journal-title":"Philos. Trans. Royal Soc. B Biol. Sci."},{"key":"20_CR53","doi-asserted-by":"publisher","first-page":"1424","DOI":"10.1111\/j.1460-9568.2009.06908.x","volume":"30","author":"EF Pavone","year":"2009","unstructured":"Pavone, E.F., Marzi, C.A., Girelli, M.: Does subliminal visual perception have an error-monitoring system? Eur. J. Neurosci. 30, 1424\u20131431 (2009). https:\/\/doi.org\/10.1111\/j.1460-9568.2009.06908.x","journal-title":"Eur. J. Neurosci."},{"key":"20_CR54","doi-asserted-by":"publisher","first-page":"5805","DOI":"10.1523\/JNEUROSCI.4335-06.2007","volume":"27","author":"HC Lau","year":"2007","unstructured":"Lau, H.C., Passingham, R.E.: Unconscious activation of the cognitive control system in the human prefrontal cortex. J. Neurosci. 27, 5805\u20135811 (2007). https:\/\/doi.org\/10.1523\/JNEUROSCI.4335-06.2007","journal-title":"J. Neurosci."},{"key":"20_CR55","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0141677","volume":"10","author":"AE Nickel","year":"2015","unstructured":"Nickel, A.E., Henke, K., Hannula, D.E.: Relational memory is evident in eye movement behavior despite the use of subliminal testing methods. PLoS ONE 10, 1\u201328 (2015). https:\/\/doi.org\/10.1371\/journal.pone.0141677","journal-title":"PLoS ONE"},{"key":"20_CR56","doi-asserted-by":"publisher","unstructured":"Bowman, H., Filetti, M., Janssen, D., Su, L., Alsufyani, A., Wyble, B.: Subliminal salience search illustrated: EEG identity and deception detection on the fringe of awareness. PLoS ONE 8 (2013). https:\/\/doi.org\/10.1371\/journal.pone.0054258","DOI":"10.1371\/journal.pone.0054258"},{"key":"20_CR57","doi-asserted-by":"publisher","first-page":"716","DOI":"10.1016\/j.concog.2013.04.011","volume":"22","author":"EK Cressman","year":"2013","unstructured":"Cressman, E.K., Lam, M.Y., Franks, I.M., Enns, J.T., Chua, R.: Unconscious and out of control: subliminal priming is insensitive to observer expectations. Conscious. Cogn. 22, 716\u2013728 (2013). https:\/\/doi.org\/10.1016\/j.concog.2013.04.011","journal-title":"Conscious. Cogn."},{"key":"20_CR58","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1111\/j.1469-8986.2007.00634.x","volume":"45","author":"M Kiss","year":"2008","unstructured":"Kiss, M., Eimer, M.: ERPs reveal subliminal processing of fearful faces. Psychophysiology 45, 318\u2013326 (2008). https:\/\/doi.org\/10.1111\/j.1469-8986.2007.00634.x","journal-title":"Psychophysiology"},{"key":"20_CR59","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1037\/h0054104","volume":"58","author":"RS Lazarus","year":"1951","unstructured":"Lazarus, R.S., McCleary, R.A.: Autonomic discrimination without awareness: a study of subception. Psychol. Rev. 58, 113 (1951)","journal-title":"Psychol. Rev."},{"key":"20_CR60","doi-asserted-by":"publisher","unstructured":"Dehaene, S., et al.: Imaging unconscious semantic priming. Nature 395, 597\u2013600 (1998). https:\/\/doi.org\/10.1038\/26967","DOI":"10.1038\/26967"},{"key":"20_CR61","doi-asserted-by":"publisher","first-page":"904","DOI":"10.1126\/science.1140459","volume":"316","author":"M Pessiglione","year":"2007","unstructured":"Pessiglione, M., et al.: How the brain translates money into force: a neuroimaging study of subliminal motivation. Science 316, 904\u2013906 (2007). https:\/\/doi.org\/10.1126\/science.1140459","journal-title":"Science"},{"key":"20_CR62","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.ijpsycho.2011.04.001","volume":"81","author":"RL Capa","year":"2011","unstructured":"Capa, R.L., Cleeremans, A., Bustin, G.M., Hansenne, M.: Long-lasting effect of subliminal processes on cardiovascular responses and performance. Int. J. Psychophysiol. 81, 22\u201330 (2011). https:\/\/doi.org\/10.1016\/j.ijpsycho.2011.04.001","journal-title":"Int. J. Psychophysiol."},{"key":"20_CR63","doi-asserted-by":"publisher","first-page":"1367","DOI":"10.1016\/j.apergo.2013.10.004","volume":"45","author":"E Duarte","year":"2014","unstructured":"Duarte, E., Rebelo, F., Teles, J., Wogalter, M.S.: Behavioral compliance for dynamic versus static signs in an immersive virtual environment. Appl. Ergon. 45, 1367\u20131375 (2014). https:\/\/doi.org\/10.1016\/j.apergo.2013.10.004","journal-title":"Appl. Ergon."},{"key":"20_CR64","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3389\/fpsyg.2012.00397","volume":"3","author":"H Reuss","year":"2012","unstructured":"Reuss, H., Kiesel, A., Kunde, W., W\u00fchr, P.: A cue from the unconscious - masked symbols prompt: spatial anticipation. Front. Psychol. 3, 1 (2012). https:\/\/doi.org\/10.3389\/fpsyg.2012.00397","journal-title":"Front. Psychol."},{"key":"20_CR65","doi-asserted-by":"publisher","unstructured":"Manly, T., Fish, J.E., Griffiths, S., Molenveld, M., Zhou, F.A., Davis, G.J.: Unconscious priming of task-switching generalizes to an untrained task. PLoS ONE 9 (2014). https:\/\/doi.org\/10.1371\/journal.pone.0088416","DOI":"10.1371\/journal.pone.0088416"},{"key":"20_CR66","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1016\/j.jesp.2008.10.001","volume":"45","author":"C Bermeitinger","year":"2009","unstructured":"Bermeitinger, C., Goelz, R., Johr, N., Neumann, M., Ecker, U.K.H., Doerr, R.: The hidden persuaders break into the tired brain. J. Exp. Soc. Psychol. 45, 320\u2013326 (2009). https:\/\/doi.org\/10.1016\/j.jesp.2008.10.001","journal-title":"J. Exp. Soc. Psychol."},{"issue":"4","key":"20_CR67","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1007\/s11002-014-9294-1","volume":"26","author":"L Smarandescu","year":"2014","unstructured":"Smarandescu, L., Shimp, T.A.: Drink coca-cola, eat popcorn, and choose powerade: testing the limits of subliminal persuasion. Mark. Lett. 26(4), 715\u2013726 (2014). https:\/\/doi.org\/10.1007\/s11002-014-9294-1","journal-title":"Mark. Lett."},{"key":"20_CR68","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1080\/026999397379872","volume":"11","author":"P Winkielman","year":"1997","unstructured":"Winkielman, P., Zajonc, R.B., Schwarz, N.: Subliminal affective priming resists attributional interventions. Cogn. Emot. 11, 433\u2013465 (1997)","journal-title":"Cogn. Emot."},{"key":"20_CR69","doi-asserted-by":"publisher","first-page":"463","DOI":"10.3758\/BF03196596","volume":"11","author":"F Schlaghecken","year":"2004","unstructured":"Schlaghecken, F., Eimer, M.: Masked prime stimuli can bias \u201cfree\u201d choices between response alternatives. Psychon. Bull. Rev. 11, 463\u2013468 (2004). https:\/\/doi.org\/10.3758\/BF03196596","journal-title":"Psychon. Bull. Rev."},{"key":"20_CR70","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1016\/j.neuron.2008.07.005","volume":"59","author":"M Pessiglione","year":"2008","unstructured":"Pessiglione, M., Petrovic, P., Daunizeau, J., Palminteri, S., Dolan, R.J., Frith, C.D.: Subliminal instrumental conditioning demonstrated in the human brain. Neuron 59, 561\u2013567 (2008). https:\/\/doi.org\/10.1016\/j.neuron.2008.07.005","journal-title":"Neuron"},{"key":"20_CR71","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.jphysparis.2008.03.015","volume":"102","author":"V Boulenger","year":"2008","unstructured":"Boulenger, V., Silber, B.Y., Roy, A.C., Paulignan, Y., Jeannerod, M., Nazir, T.A.: Subliminal display of action words interferes with motor planning: a combined EEG and kinematic study. J. Physiol. Paris 102, 130\u2013136 (2008). https:\/\/doi.org\/10.1016\/j.jphysparis.2008.03.015","journal-title":"J. Physiol. Paris"},{"key":"20_CR72","doi-asserted-by":"publisher","unstructured":"Aarts, H., Custers, R., Marien, H.: Preparing and motivating behavior outside of awareness. Science (New York, N.Y.) 319, 1639 (2008). https:\/\/doi.org\/10.1126\/science.1150432","DOI":"10.1126\/science.1150432"},{"key":"20_CR73","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1111\/j.1559-1816.2012.00985.x","volume":"43","author":"B Gibson","year":"2013","unstructured":"Gibson, B., Zielaskowski, K.: Subliminal priming of winning images prompts increased betting in slot machine play. J. Appl. Soc. Psychol. 43, 106\u2013115 (2013)","journal-title":"J. Appl. Soc. Psychol."},{"key":"20_CR74","doi-asserted-by":"publisher","first-page":"977","DOI":"10.1177\/0956797610372636","volume":"21","author":"L Schmidt","year":"2010","unstructured":"Schmidt, L., Palminteri, S., Lafargue, G., Pessiglione, M.: Splitting motivation. Psychol. Sci. 21, 977\u2013983 (2010). https:\/\/doi.org\/10.1177\/0956797610372636","journal-title":"Psychol. Sci."},{"key":"20_CR75","doi-asserted-by":"publisher","first-page":"889","DOI":"10.1111\/j.1469-8986.2009.00810.x","volume":"46","author":"M Lui","year":"2009","unstructured":"Lui, M., Rosenfeld, J.P.: The application of subliminal priming in lie detection: scenario for identification of members of a terrorist ring. Psychophysiology 46, 889\u2013903 (2009). https:\/\/doi.org\/10.1111\/j.1469-8986.2009.00810.x","journal-title":"Psychophysiology"},{"key":"20_CR76","doi-asserted-by":"publisher","first-page":"695","DOI":"10.1016\/j.jrp.2009.02.011","volume":"43","author":"R Radel","year":"2009","unstructured":"Radel, R., Sarrazin, P., Legrain, P., Gobanc\u00e9, L.: Subliminal priming of motivational orientation in educational settings: effect on academic performance moderated by mindfulness. J. Res. Pers. 43, 695\u2013698 (2009). https:\/\/doi.org\/10.1016\/j.jrp.2009.02.011","journal-title":"J. Res. Pers."},{"key":"20_CR77","doi-asserted-by":"crossref","unstructured":"Westen, D.: RATS, we should have used Clinton: subliminal priming in political campaigns. Polit. Psychol. 29(5), 631\u2013651 (2008). Published by: International Society of Political 29, 631\u2013651 (2016). Author (s): Joel Weinberger and Drew Westen Source\u202f","DOI":"10.1111\/j.1467-9221.2008.00658.x"},{"key":"20_CR78","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1037\/0022-3514.43.3.437","volume":"43","author":"JA Bargh","year":"1982","unstructured":"Bargh, J.A., Pietromonaco, P.: Automatic information processing and social perception: the influence of trait information presented outside of conscious awareness on impression formation. J. Pers. Soc. Psychol. 43, 437 (1982)","journal-title":"J. Pers. Soc. Psychol."},{"key":"20_CR79","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1016\/S0022-1031(77)80007-3","volume":"13","author":"E Tory Higgins","year":"1977","unstructured":"Tory Higgins, E., Rholes, W.S., Jones, C.R.: Category accessibility and impression formation. J. Exp. Soc. Psychol. 13, 141\u2013154 (1977)","journal-title":"J. Exp. Soc. Psychol."},{"key":"20_CR80","doi-asserted-by":"crossref","unstructured":"Dijksterhuis, A., Bargh, J.A.: The perception-behavior expressway: automatic effects of social perception on social behavior. In: Advances in Experimental Social Psychology, pp. 1\u201340. Elsevier (2001)","DOI":"10.1016\/S0065-2601(01)80003-4"},{"key":"20_CR81","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1006\/jesp.2000.1427","volume":"544","author":"A Dijksterhuis","year":"2000","unstructured":"Dijksterhuis, A., Bargh, J.A.: On the relation between associative strength and automatic behavior 544, 531\u2013544 (2000). https:\/\/doi.org\/10.1006\/jesp.2000.1427","journal-title":"On the relation between associative strength and automatic behavior"},{"key":"20_CR82","unstructured":"Dijksterhuis, A., Bargh, J.A., Miedema, J.: Of men and mackerels: attention, subjective experience, and automatic social behavior. The message within: the role of subjective experience in social cognition and behavior, pp. 37\u201351 (2000)"},{"key":"20_CR83","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1037\/0033-2909.106.2.265","volume":"106","author":"RF Bornstein","year":"1989","unstructured":"Bornstein, R.F.: Exposure and affect: overview and meta-analysis of research, 1968\u20131987. Psychol. Bull. 106, 265\u2013289 (1989). https:\/\/doi.org\/10.1037\/0033-2909.106.2.265","journal-title":"Psychol. Bull."},{"key":"20_CR84","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1126\/science.2296719","volume":"247","author":"E Tulving","year":"1990","unstructured":"Tulving, E., Schacter, D.: Priming and human memory systems phenomena of prining. Science 247, 301\u2013306 (1990)","journal-title":"Science"},{"key":"20_CR85","unstructured":"Bargh, J.: The automaticity of everyday life. In: Advances in Social Cognition, vol. X. Psychology Press (2014)"},{"key":"20_CR86","doi-asserted-by":"crossref","unstructured":"Agrawal, N., Zhu, F., Carpenter, S.: Do you see the warning? Cybersecurity warnings via nonconscious processing. In: Proceedings of the 2020 ACM Southeast Conference (2020)","DOI":"10.1145\/3374135.3385314"},{"key":"20_CR87","unstructured":"Kihlstrom, J.F., Barnhardt, T.M., Tataryn, D.J.: Implicit perception (1992)"},{"key":"20_CR88","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/nature13314.A","volume":"2","author":"J Bargh","year":"2006","unstructured":"Bargh, J.: The automaticity of social life. Curr. Dir. Psychol. Sci. 2, 1\u20134 (2006). https:\/\/doi.org\/10.1038\/nature13314.A","journal-title":"Curr. Dir. Psychol. Sci."},{"key":"20_CR89","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1086\/341577","volume":"29","author":"JA Bargh","year":"2002","unstructured":"Bargh, J.A.: Losing consciousness: automatic influences on consumer judgment, behavior, and motivation. J. Consum. Res. 29, 280\u2013285 (2002)","journal-title":"J. Consum. Res."},{"key":"20_CR90","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/BF00382916","volume":"3","author":"JE Gratz","year":"1984","unstructured":"Gratz, J.E.: The ethics of subliminal communication. J. Bus. Ethics 3, 181\u2013184 (1984). https:\/\/doi.org\/10.1007\/BF00382916","journal-title":"J. Bus. Ethics"},{"key":"20_CR91","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1080\/00913367.1979.10673284","volume":"8","author":"JS Kelly","year":"1979","unstructured":"Kelly, J.S.: Subliminal embeds in print advertising: a challenge to advertisng ethics. J. Advert. 8, 20\u201324 (1979). https:\/\/doi.org\/10.1080\/00913367.1979.10673284","journal-title":"J. Advert."},{"key":"20_CR92","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1002\/mar.4220040204","volume":"4","author":"J Saegert","year":"1987","unstructured":"Saegert, J.: Why marketing should quit giving subliminal advertising the benefit of the doubt. Psychol. Mark. 4, 107\u2013120 (1987). https:\/\/doi.org\/10.1002\/mar.4220040204","journal-title":"Psychol. Mark."},{"key":"20_CR93","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1080\/00913367.1983.10672829","volume":"12","author":"EJ Zanot","year":"1983","unstructured":"Zanot, E.J., Pincus, J.D., Lamp, E.J.: Public perceptions of subliminal advertising. J. Advert. 12, 39\u201344 (1983)","journal-title":"J. Advert."},{"key":"20_CR94","doi-asserted-by":"publisher","unstructured":"Haber, R.N.: Public attitudes regarding subliminal advertising. Public Opin. Q. 23(2), 291\u2013293 (1959). https:\/\/doi.org\/10.1086\/266875","DOI":"10.1086\/266875"},{"key":"20_CR95","first-page":"10","volume":"12","author":"M Rogers","year":"1993","unstructured":"Rogers, M., Smith, K.H.: Public perceptions of subliminal advertising. J. Advert. Res. 12, 10\u201318 (1993)","journal-title":"J. Advert. Res."},{"key":"20_CR96","unstructured":"Baruca, A., Saldivar, R., Flores, J.: Is neuromarketing ethical? Consumers say yes. Consumers say no. J. Leg. Ethical Regul. Issues 2, 77\u201391 (2014)"}],"container-title":["Lecture Notes in Computer Science","Persuasive Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-98438-0_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,11]],"date-time":"2024-03-11T11:12:26Z","timestamp":1710155546000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-98438-0_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030984373","9783030984380"],"references-count":96,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-98438-0_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"21 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PERSUASIVE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Persuasive Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Doha","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Qatar","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 March 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 March 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"persuasive2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/persuasivetech.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}