{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T00:21:31Z","timestamp":1778631691382,"version":"3.51.4"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031055621","type":"print"},{"value":"9783031055638","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-05563-8_12","type":"book-chapter","created":{"date-parts":[[2022,5,13]],"date-time":"2022-05-13T16:08:55Z","timestamp":1652458135000},"page":"173-193","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Are HTTPS Configurations Still a\u00a0Challenge?: Validating Theories of\u00a0Administrators\u2019 Difficulties with\u00a0TLS Configurations"],"prefix":"10.1007","author":[{"given":"Alexandra","family":"Mai","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Oliver","family":"Schedler","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Edgar","family":"Weippl","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Katharina","family":"Krombholz","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,6,16]]},"reference":[{"key":"12_CR1","unstructured":"Aas, J.: Why ninety-day lifetimes for certificates? https:\/\/letsencrypt.org\/2015\/11\/09\/why-90-days.html. Accessed 08 Jan 2021"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Aas, J., et al.: Let\u2019s encrypt: an automated certificate authority to encrypt the entire web. In: ACM SIGSAC Conference on Computer and Communications Security (CCS 2019), pp. 2473\u20132487 (2019)","DOI":"10.1145\/3319535.3363192"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Acar, Y., Backes, M., Fahl, S., Kim, D., Mazurek, M.L., Stransky, C.: You get where you\u2019re looking for: the impact of information sources on code security. In: IEEE Symposium on Security and Privacy (S&P 2016), pp. 289\u2013305. IEEE (2016)","DOI":"10.1109\/SP.2016.25"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Aertsen, M., Korczy\u0144ski, M., Moura, G.C., Tajalizadehkhoob, S., van den Berg, J.: No domain left behind: is let\u2019s encrypt democratizing encryption? In: Applied Networking Research Workshop, pp. 48\u201354 (2017)","DOI":"10.1145\/3106328.3106338"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Akhawe, D., Amann, B., Vallentin, M., Sommer, R.: Here\u2019s my cert, so trust me, maybe? Understanding TLS errors on the web. In: 22nd International Conference on World Wide Web, pp. 59\u201370 (2013)","DOI":"10.1145\/2488388.2488395"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Bernhard, M., Sharman, J., Acemyan, C.Z., Kortum, P., Wallach, D.S., Halderman, J.A.: On the usability of https deployment. In: 2019 CHI Conference on Human Factors in Computing Systems, pp. 1\u201310 (2019)","DOI":"10.1145\/3290605.3300540"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Chan, C., Fontugne, R., Cho, K., Goto, S.: Monitoring TLS adoption using backbone and edge traffic. In: IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 208\u2013213. IEEE (2018)","DOI":"10.1109\/INFCOMW.2018.8406957"},{"key":"12_CR8","unstructured":"Cimpanu, C.: 14,766 Let\u2019s Encrypt SSL Certificates Issued to PayPal Phishing Sites. https:\/\/www.bleepingcomputer.com\/news\/security\/14-766-lets-encrypt-ssl-certificates-issued-to-paypal-phishing-sites\/. Accessed 11 Dec 2020"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Clark, J., Van Oorschot, P.C.: SoK: SSL and https: revisiting past challenges and evaluating certificate trust model enhancements. In: IEEE Symposium on Security and Privacy (S&P 2013), pp. 511\u2013525. IEEE (2013)","DOI":"10.1109\/SP.2013.41"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Durumeric, Z., Kasten, J., Bailey, M., Halderman, J.A.: Analysis of the https certificate ecosystem. In: Conference on Internet Measurement, pp. 291\u2013304 (2013)","DOI":"10.1145\/2504730.2504755"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Durumeric, Z., et al.: The security impact of https interception. In: Network and Distributed System Security Symposium (NDSS 2017) (2017)","DOI":"10.14722\/ndss.2017.23456"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Fahl, S., Acar, Y., Perl, H., Smith, M.: Why eve and Mallory (also) love webmasters: a study on the root causes of SSL misconfigurations. In: ACM Symposium on Information, Computer and Communications Security, pp. 507\u2013512 (2014)","DOI":"10.1145\/2590296.2590341"},{"key":"12_CR13","unstructured":"Felt, A.P., Barnes, R., King, A., Palmer, C., Bentzel, C., Tabriz, P.: Measuring https adoption on the web. In: 26th USENIX Security Symposium (USENIX 2017), pp. 1323\u20131338 (2017)"},{"key":"12_CR14","unstructured":"GmbH SS: SoSci Survey - the Solution for Professional Online Questionnaires. https:\/\/www.soscisurvey.de\/. Accessed 08 Jan 2021"},{"issue":"6","key":"12_CR15","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1016\/j.jclinepi.2007.07.012","volume":"61","author":"IA Harris","year":"2008","unstructured":"Harris, I.A., Khoo, O.K., Young, J.M., Solomon, M.J., Rae, H.: Lottery incentives did not improve response rate to a mailed survey: a randomized controlled trial. J. Clin. Epidemiol. 61(6), 609\u2013610 (2008)","journal-title":"J. Clin. Epidemiol."},{"key":"12_CR16","unstructured":"Holm, S.: A simple sequentially rejective multiple test procedure. Scand. J. Stat. (1979)"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Jensen, E., Laurie, C.: Doing Real Research: A Practical Guide to Social Research. Sage (2016). ISBN 978-1446273883","DOI":"10.4135\/9781036235093"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Kim, H.Y.: Statistical notes for clinical researchers: chi-squared test and Fisher\u2019s exact test. Restorative Dentistry Endod. 42(2) (2017)","DOI":"10.5395\/rde.2017.42.2.152"},{"key":"12_CR19","unstructured":"Krippendorff, K.: Content Analysis: An Introduction to It\u2019s Methodology, pp. 241\u2013243. SAGE Publications (2004)"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Krombholz, K., Busse, K., Pfeffer, K., Smith, M., von Zezschwitz, E.: \u201cIf HTTPS were secure, I wouldn\u2019t need 2FA\u201d-end user and administrator mental models of HTTPS. In: IEEE Symposium on Security and Privacy (S&P 2019) (2019)","DOI":"10.1109\/SP.2019.00060"},{"key":"12_CR21","unstructured":"Krombholz, K., Mayer, W., Schmiedecker, M., Weippl, E.: \u201cI have no idea what I\u2019m doing\u201d-on the usability of deploying HTTPS. In: 26th USENIX Security Symposium (USENIX 2017), pp. 1339\u20131356 (2017)"},{"issue":"5","key":"12_CR22","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1007\/s11162-010-9203-2","volume":"52","author":"JS Laguilles","year":"2011","unstructured":"Laguilles, J.S., Williams, E.A., Saunders, D.B.: Can lottery incentives boost web survey response rates? Findings from four experiments. Res. High. Educ. 52(5), 537\u2013553 (2011)","journal-title":"Res. High. Educ."},{"issue":"4","key":"12_CR23","doi-asserted-by":"publisher","first-page":"587","DOI":"10.2224\/sbp.2013.41.4.587","volume":"41","author":"JH Lee","year":"2013","unstructured":"Lee, J.H., Song, C.H.: Effects of trust and perceived risk on user acceptance of a new technology service. Soc. Behav. Personal. Int. J. 41(4), 587\u2013597 (2013)","journal-title":"Soc. Behav. Personal. Int. J."},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Lenth, R.V.: Some practical guidelines for effective sample size determination. Am. Stat. 55(3) (2001)","DOI":"10.1198\/000313001317098149"},{"key":"12_CR25","unstructured":"Lipsey, M.W.: Design Sensitivity: Statistical Power for Experimental Research. Sage (1989). ISBN 978-0803930636"},{"key":"12_CR26","unstructured":"Liu, S.: Software developer gender distribution worldwide as of early (2020). https:\/\/www.statista.com\/statistics\/1126823\/worldwide-developer-gender\/. Accessed 10 Jan 2021"},{"key":"12_CR27","unstructured":"Manousis, A., Ragsdale, R., Draffin, B., Agrawal, A., Sekar, V.: Shedding light on the adoption of let\u2019s encrypt. arXiv preprint arXiv:1611.00469 (2016)"},{"key":"12_CR28","unstructured":"Naiakshina, A., Danilova, A., Tiefenau, C., Smith, M.: Deception task design in developer password studies: exploring a student sample. In: Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), pp. 297\u2013313 (2018)"},{"issue":"2","key":"12_CR29","first-page":"1","volume":"12","author":"KM Nor","year":"1970","unstructured":"Nor, K.M., Pearson, J.M.: The influence of trust on internet banking acceptance. J. Internet Banking Commer. 12(2), 1\u201310 (1970)","journal-title":"J. Internet Banking Commer."},{"key":"12_CR30","unstructured":"Oltrogge, M., Acar, Y., Dechand, S., Smith, M., Fahl, S.: To pin or not to pin-helping app developers bullet proof their TLS connections. In: 24th USENIX Security Symposium (USENIX 2015), pp. 239\u2013254 (2015)"},{"key":"12_CR31","doi-asserted-by":"crossref","unstructured":"Parsovs, A.: Practical issues with TLS client certificate authentication. In: Network and Distributed System Security Symposium (NDSS 2014), vol. 14, pp. 23\u201326 (2014)","DOI":"10.14722\/ndss.2014.23036"},{"key":"12_CR32","unstructured":"Pfeffer, K., et al.: On the usability of authenticity checks for hardware security tokens. In: 30th USENIX Security Symposium (USENIX 2021) (2021)"},{"key":"12_CR33","doi-asserted-by":"crossref","unstructured":"Redmiles, E.M., Malone, A.R., Mazurek, M.L.: I think they\u2019re trying to tell me something: advice sources and selection for digital security. In: IEEE Symposium on Security and Privacy (S&P 2016), pp. 272\u2013288. IEEE (2016)","DOI":"10.1109\/SP.2016.24"},{"key":"12_CR34","doi-asserted-by":"crossref","unstructured":"Tiefenau, C., von Zezschwitz, E., H\u00e4ring, M., Krombholz, K., Smith, M.: A usability evaluation of let\u2019s encrypt and certbot: usable security done right. In: ACM SIGSAC Conference on Computer and Communications Security (CCS 2019), pp. 1971\u20131988 (2019)","DOI":"10.1145\/3319535.3363220"},{"key":"12_CR35","doi-asserted-by":"crossref","unstructured":"Yakdan, K., Dechand, S., Gerhards-Padilla, E., Smith, M.: Helping Johnny to analyze malware: a usability-optimized decompiler and malware analysis user study. In: IEEE Symposium on Security and Privacy (S&P 2016), pp. 158\u2013177. IEEE (2016)","DOI":"10.1109\/SP.2016.18"}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-05563-8_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T00:03:40Z","timestamp":1778630620000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-05563-8_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031055621","9783031055638"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-05563-8_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"16 June 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2022.hci.international\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}