{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:22:42Z","timestamp":1767705762142,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031055621"},{"type":"electronic","value":"9783031055638"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-05563-8_1","type":"book-chapter","created":{"date-parts":[[2022,5,13]],"date-time":"2022-05-13T20:08:55Z","timestamp":1652472535000},"page":"3-15","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Intermediate Help with\u00a0Using Digital Devices and\u00a0Online Accounts: Understanding the\u00a0Needs, Expectations, and\u00a0Vulnerabilities of\u00a0Young Adults"],"prefix":"10.1007","author":[{"given":"Hanieh","family":"Atashpanjeh","sequence":"first","affiliation":[]},{"given":"Arezou","family":"Behfar","sequence":"additional","affiliation":[]},{"given":"Cassity","family":"Haverkamp","sequence":"additional","affiliation":[]},{"given":"Maryellen McClain","family":"Verdoes","sequence":"additional","affiliation":[]},{"given":"Mahdi Nasrullah","family":"Al-Ameen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,16]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Ahmed, T., Hoyle, R., Connelly, K., Crandall, D., Kapadia, A.: Privacy concerns and behaviors of people with visual impairments. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp. 3523\u20133532 (2015)","DOI":"10.1145\/2702123.2702334"},{"key":"1_CR2","unstructured":"Akter, T., Dosono, B., Ahmed, T., Kapadia, A., Semaan, B.: I am uncomfortable sharing what i can\u2019t see: privacy concerns of the visually impaired with camera based assistive applications. In: 29th USENIX Security Symposium, pp. 1929\u20131948 (2020)"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Al-Ameen, M.N., Chauhan, A., Ahsan, M.M., Kocabas, H.: A look into user\u2019s privacy perceptions and data practices of IoT devices. Inf. Comput. Secur. (2021)","DOI":"10.1108\/ICS-08-2020-0134"},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1007\/978-3-319-24177-7_22","volume-title":"Computer Security \u2013 ESORICS 2015","author":"MN Al-Ameen","year":"2015","unstructured":"Al-Ameen, M.N., Fatema, K., Wright, M., Scielzo, S.: Leveraging real-life facts to make random passwords more memorable. In: Pernul, G., Ryan, P.Y.A., Weippl, E. (eds.) ESORICS 2015. LNCS, vol. 9327, pp. 438\u2013455. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24177-7_22"},{"issue":"4","key":"1_CR5","doi-asserted-by":"publisher","first-page":"203","DOI":"10.2478\/popets-2021-0067","volume":"2021","author":"MN Al-Ameen","year":"2021","unstructured":"Al-Ameen, M.N., Kocabas, H., Nandy, S., Tamanna, T.: we, three brothers have always known everything of each other: a cross-cultural study of sharing digital devices and online accounts. Proc. Priv. Enhancing Technol. 2021(4), 203\u2013224 (2021)","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Al-Ameen, M.N., Kocabas, H.M.: A first look into users\u2019 perceptions of digital medicine technology. In: Conference Companion Publication of the 2020 on Computer Supported Cooperative Work and Social Computing, pp. 203\u2013207 (2020)","DOI":"10.1145\/3406865.3418314"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-3-030-77392-2_18","volume-title":"HCI for Cybersecurity, Privacy and Trust","author":"MN Al-Ameen","year":"2021","unstructured":"Al-Ameen, M.N., Tamanna, T., Nandy, S., Kocabas, H.: Understanding user behavior, information exposure, and privacy risks in managing old devices. In: Moallem, A. (ed.) HCII 2021. LNCS, vol. 12788, pp. 281\u2013296. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-77392-2_18"},{"key":"1_CR8","volume-title":"Understanding Your Users: A Practical Guide to User Research Methods","author":"K Baxter","year":"2015","unstructured":"Baxter, K., Courage, C., Caine, K.: Understanding Your Users: A Practical Guide to User Research Methods, 2nd edn. Morgan Kaufmann Publishers Inc., San Francisco (2015)","edition":"2"},{"key":"1_CR9","unstructured":"Boyatzis, R.E.: Transforming Qualitative Information: Thematic Analysis and Code Development. sage, Thousand Oaks (1998)"},{"issue":"2","key":"1_CR10","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1191\/1478088706qp063oa","volume":"3","author":"V Braun","year":"2006","unstructured":"Braun, V., Clarke, V.: Using thematic analysis in psychology. Qual. Res. Psychol. 3(2), 77\u2013101 (2006)","journal-title":"Qual. Res. Psychol."},{"issue":"1","key":"1_CR11","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1093\/lpr\/mgp031","volume":"9","author":"IE Dror","year":"2010","unstructured":"Dror, I.E., Mnookin, J.L.: The use of technology in human expert domains: challenges and risks arising from the use of automated fingerprint identification systems in forensic science. Law Probab. Risk 9(1), 47\u201367 (2010)","journal-title":"Law Probab. Risk"},{"key":"1_CR12","unstructured":"Erikson, E.H.: Childhood and Society. WW Norton & Company (1993)"},{"key":"1_CR13","unstructured":"Hayes, J., Kaushik, S., Price, C.E., Wang, Y.: Cooperative privacy and security: Learning from people with visual impairments and their allies. In: Fifteenth Symposium on Usable Privacy and Security, pp. 1\u201320 (2019)"},{"key":"1_CR14","doi-asserted-by":"publisher","first-page":"1713","DOI":"10.3389\/fpsyg.2019.01713","volume":"10","author":"SU Johnson","year":"2019","unstructured":"Johnson, S.U., Ulvenes, P.G., \u00d8ktedalen, T., Hoffart, A.: Psychometric properties of the general anxiety disorder 7-item (GAD-7) scale in a heterogeneous psychiatric sample. Front. Psychol. 10, 1713 (2019)","journal-title":"Front. Psychol."},{"issue":"4","key":"1_CR15","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1207\/S15327051HCI1504_2","volume":"15","author":"S Kiesler","year":"2000","unstructured":"Kiesler, S., Zdaniuk, B., Lundmark, V., Kraut, R.: Troubles with the internet: the dynamics of help at home. Hum.-Comput. Interact. 15(4), 323\u2013351 (2000)","journal-title":"Hum.-Comput. Interact."},{"key":"1_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/978-3-030-77392-2_20","volume-title":"HCI for Cybersecurity, Privacy and Trust","author":"H Kocabas","year":"2021","unstructured":"Kocabas, H., Nandy, S., Tamanna, T., Al-Ameen, M.N.: Understanding User\u2019s behavior and protection strategy upon losing, or identifying unauthorized access to online account. In: Moallem, Abbas (ed.) HCII 2021. LNCS, vol. 12788, pp. 310\u2013325. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-77392-2_20"},{"issue":"CSCW3","key":"1_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3432954","volume":"4","author":"J Kropczynski","year":"2021","unstructured":"Kropczynski, J., Aljallad, Z., Elrod, N.J., Lipford, H., Wisniewski, P.J.: Towards building community collective efficacy for managing digital privacy and security within older adult communities. Proc. ACM Hum.-Comput. Inter. 4(CSCW3), 1\u201327 (2021)","journal-title":"Proc. ACM Hum.-Comput. Inter."},{"issue":"2","key":"1_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1754393.1754396","volume":"10","author":"P Kumaraguru","year":"2010","unstructured":"Kumaraguru, P., Sheng, S., Acquisti, A., Cranor, L.F., Hong, J.: Teaching Johnny not to fall for phish. ACM Trans. Internet Technol. (TOIT) 10(2), 1\u201331 (2010)","journal-title":"ACM Trans. Internet Technol. (TOIT)"},{"issue":"1","key":"1_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0039-6257(87)90069-5","volume":"32","author":"SR Lambert","year":"1987","unstructured":"Lambert, S.R., Hoyt, C.S., Narahara, M.H.: Optic nerve hypoplasia. Surv. Ophthalmol. 32(1), 1\u20139 (1987)","journal-title":"Surv. Ophthalmol."},{"issue":"4","key":"1_CR20","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1097\/00129492-200307000-00016","volume":"24","author":"C Madden","year":"2003","unstructured":"Madden, C., Halsted, M., Benton, C., Greinwald, J., Choo, D.: Enlarged vestibular aqueduct syndrome in the pediatric population. Otol. Neurotology 24(4), 625\u2013632 (2003)","journal-title":"Otol. Neurotology"},{"key":"1_CR21","unstructured":"Marne, S.T., Al-Ameen, M.N., Wright, M.K.: Learning system-assigned passwords: a preliminary study on the people with learning disabilities. In: SOUPS (2017)"},{"issue":"4","key":"1_CR22","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1037\/0022-0663.84.4.444","volume":"84","author":"RE Mayer","year":"1992","unstructured":"Mayer, R.E., Anderson, R.B.: The instructive animation: helping students build connections between words and pictures in multimedia learning. J. Educ. Psychol. 84(4), 444 (1992)","journal-title":"J. Educ. Psychol."},{"issue":"CSCW2","key":"1_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3415235","volume":"4","author":"HM Mentis","year":"2020","unstructured":"Mentis, H.M., Madjaroff, G., Massey, A., Trendafilova, Z.: The illusion of choice in discussing cybersecurity safeguards between older adults with mild cognitive impairment and their caregivers. Proc. ACM Hum.-Comput. Inter. 4(CSCW2), 1\u201319 (2020)","journal-title":"Proc. ACM Hum.-Comput. Inter."},{"issue":"2","key":"1_CR24","doi-asserted-by":"publisher","first-page":"e382","DOI":"10.1542\/peds.2009-2826","volume":"126","author":"DR Moore","year":"2010","unstructured":"Moore, D.R., Ferguson, M.A., Edmondson-Jones, A.M., Ratib, S., Riley, A.: Nature of auditory processing disorder in children. Pediatrics 126(2), e382\u2013e390 (2010)","journal-title":"Pediatrics"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Poole, E.S., Chetty, M., Morgan, T., Grinter, R.E., Edwards, W.K.: Computer help at home: methods and motivations for informal technical support. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 739\u2013748 (2009)","DOI":"10.1145\/1518701.1518816"},{"key":"1_CR26","doi-asserted-by":"publisher","first-page":"102227","DOI":"10.1016\/j.cose.2021.102227","volume":"105","author":"S Seng","year":"2021","unstructured":"Seng, S., Al-Ameen, M.N., Wright, M.: A first look into users\u2019 perceptions of facial recognition in the physical world. Comput. Secur. 105, 102227 (2021)","journal-title":"Comput. Secur."},{"issue":"5","key":"1_CR27","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1056\/NEJM199801293380507","volume":"338","author":"SE Shaywitz","year":"1998","unstructured":"Shaywitz, S.E.: Dyslexia. N. Engl. J. Med. 338(5), 307\u2013312 (1998)","journal-title":"N. Engl. J. Med."},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"Singh, S., Cabraal, A., Demosthenous, C., Astbrink, G., Furlong, M.: Password sharing: implications for security design based on social practice. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 895\u2013904 (2007)","DOI":"10.1145\/1240624.1240759"},{"key":"1_CR29","first-page":"296","volume":"8","author":"S Sj\u00f8berg","year":"2002","unstructured":"Sj\u00f8berg, S.: Science and technology education: current challenges and possible solutions. Innovations Sci. Technol. Educ. 8, 296\u2013307 (2002)","journal-title":"Innovations Sci. Technol. Educ."},{"key":"1_CR30","doi-asserted-by":"crossref","unstructured":"Wahidin, H., Waycott, J., Baker, S.: The challenges in adopting assistive technologies in the workplace for people with visual impairments. In: Proceedings of the 30th Australian Conference on Computer-Human Interaction, pp. 432\u2013442 (2018)","DOI":"10.1145\/3292147.3292175"}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-05563-8_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T17:57:54Z","timestamp":1709834274000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-05563-8_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031055621","9783031055638"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-05563-8_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"16 June 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2022.hci.international\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}