{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:43:57Z","timestamp":1742921037024,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031101823"},{"type":"electronic","value":"9783031101830"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-10183-0_3","type":"book-chapter","created":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T13:06:54Z","timestamp":1657717614000},"page":"43-64","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Bringing Crypto Knowledge to\u00a0School: Examining and\u00a0Improving Junior High School Students\u2019 Security Assumptions About Encrypted Chat Apps"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4339-501X","authenticated-orcid":false,"given":"Leonie","family":"Schaewitz","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1643-1254","authenticated-orcid":false,"given":"Cedric A.","family":"Lohmann","sequence":"additional","affiliation":[]},{"given":"Konstantin","family":"Fischer","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1823-5505","authenticated-orcid":false,"given":"M. Angela","family":"Sasse","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,14]]},"reference":[{"key":"3_CR1","unstructured":"Abu-Salma, R., Redmiles, E.M., Ur, B., Wei, M.: Exploring user mental models of end-to-end encrypted communication tools. In: 8th USENIX Workshop on Free and Open Communications on the Internet (FOCI 18) (2018)"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Abu-Salma, R., Sasse, M.A., Bonneau, J., Danilova, A., Naiakshina, A., Smith, M.: Obstacles to the adoption of secure communication tools. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 137\u2013153. IEEE (2017)","DOI":"10.1109\/SP.2017.65"},{"key":"3_CR3","unstructured":"Akgul, O., Bai, W., Das, S., Mazurek, M.L.: Evaluating in-workflow messages for improving mental models of end-to-end encryption. In: 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, August 2021"},{"key":"3_CR4","first-page":"2018","volume":"31","author":"M Anderson","year":"2018","unstructured":"Anderson, M., Jiang, J.: Teens, social media and technology 2018. Pew Research Center 31, 2018 (2018)","journal-title":"Pew Research Center"},{"key":"3_CR5","doi-asserted-by":"publisher","unstructured":"Bai, W., Pearson, M., Kelley, P.G., Mazurek, M.L.: Improving non-experts\u2019 understanding of end-to-end encryption: an exploratory study. In: 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS &P), pp. 210\u2013219 (2020). https:\/\/doi.org\/10.1109\/EuroSPW51379.2020.00036","DOI":"10.1109\/EuroSPW51379.2020.00036"},{"key":"3_CR6","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1037\/\/0033-295x.84.2.191","volume":"84","author":"A Bandura","year":"1977","unstructured":"Bandura, A.: Self-efficacy: toward a unifying theory of behavioral change. Psychol. Rev. 84, 191\u2013215 (1977). https:\/\/doi.org\/10.1037\/\/0033-295x.84.2.191","journal-title":"Psychol. Rev."},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Dechand, S., Naiakshina, A., Danilova, A., Smith, M.: In encryption we don\u2019t trust: the effect of end-to-end encryption to the masses on user perception. In: 2019 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 401\u2013415. IEEE (2019)","DOI":"10.1109\/EuroSP.2019.00037"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Demjaha, A., Spring, J.M., Becker, I., Parkin, S., Sasse, M.A.: Metaphors considered harmful? An exploratory study of the effectiveness of functional metaphors for end-to-end encryption. In: Proceedings 2018 Workshop on Usable Security, vol. 2018. Internet Society (2018)","DOI":"10.14722\/usec.2018.23015"},{"key":"3_CR9","unstructured":"Dengel, A.: Public-private-key encryption in virtual reality: predictors of students\u2019 learning outcomes for teaching the idea of asymmetric encryption. CoolThink@ JC, p. 41 (2020)"},{"key":"3_CR10","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1201\/b15703-10","volume-title":"User Centered System Design: New Perspectives on Human-Computer Interaction","author":"A diSessa","year":"1986","unstructured":"diSessa, A.: Models of computation. In: Norman, D.A., Draper, S.W. (eds.) User Centered System Design: New Perspectives on Human-Computer Interaction, pp. 201\u2013218. Lawrence Erlbaum Associates, Hillsdale (1986)"},{"key":"3_CR11","unstructured":"Electronic Frontier Foundation: Surveillance self-defense: tips, tools and how-tos for safer online communications. https:\/\/ssd.eff.org\/en"},{"key":"3_CR12","volume-title":"Discovering Statistics Using IBM SPSS Statistics","author":"A Field","year":"2013","unstructured":"Field, A.: Discovering Statistics Using IBM SPSS Statistics, 4th edn. Sage, London (2013)","edition":"4"},{"issue":"1","key":"3_CR13","first-page":"20","volume":"5","author":"DG Freelon","year":"2010","unstructured":"Freelon, D.G.: ReCal: intercoder reliability calculation as a web service. Int. J. Internet Sci. 5(1), 20\u201333 (2010)","journal-title":"Int. J. Internet Sci."},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Gerber, N., Zimmermann, V., Henhapl, B., Emer\u00f6z, S., Volkamer, M.: Finally Johnny can encrypt: but does this make him feel more secure? In: Proceedings of the 13th International Conference on Availability, Reliability and Security, pp. 1\u201310 (2018)","DOI":"10.1145\/3230833.3230859"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Herzberg, A., Leibowitz, H.: Can Johnny finally encrypt? Evaluating E2E-encryption in popular IM applications. In: Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust, pp. 17\u201328 (2016)","DOI":"10.1145\/3046055.3046059"},{"key":"3_CR16","unstructured":"Johnson-Laird, P.N.: Mental Models: Towards a Cognitive Science of Language, Inference, and Consciousness. Harvard University Press (1983)"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Krombholz, K., Busse, K., Pfeffer, K., Smith, M., von Zezschwitz, E.: \u201cIf HTTPS were secure, I wouldn\u2019t need 2FA\u201d- End user and administrator mental models of HTTPS. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 246\u2013263. IEEE (2019)","DOI":"10.1109\/SP.2019.00060"},{"key":"3_CR18","doi-asserted-by":"publisher","unstructured":"Lindmeier, A., M\u00fchling, A.: Keeping secrets: K-12 students\u2019 understanding of cryptography. In: Proceedings of the 15th Workshop on Primary and Secondary Computing Education. WiPSCE 2020. Association for Computing Machinery, New York (2020). https:\/\/doi.org\/10.1145\/3421590.3421630","DOI":"10.1145\/3421590.3421630"},{"key":"3_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/1609406919899220","volume":"19","author":"C O\u2019Connor","year":"2020","unstructured":"O\u2019Connor, C., Joffe, H.: Intercoder reliability in qualitative research: debates and practical guidelines. Int. J. Qual. Methods 19, 1\u201313 (2020). https:\/\/doi.org\/10.1177\/1609406919899220","journal-title":"Int. J. Qual. Methods"},{"key":"3_CR20","unstructured":"Paverd, A., Martin, A., Brown, I.: Modelling and automatically analysing privacy properties for honest-but-curious adversaries. Technical report (2014)"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Schr\u00f6der, S., Huber, M., Wind, D., Rottermanner, C.: When signal hits the fan: on the usability and security of state-of-the-art secure mobile messaging. In: European Workshop on Usable Security, pp. 1\u20137. IEEE (2016)","DOI":"10.14722\/eurousec.2016.23012"},{"key":"3_CR22","unstructured":"Team Guild: A timeline of trouble: Facebook\u2019s privacy record, August 2021. https:\/\/guild.co\/blog\/complete-list-timeline-of-facebook-scandals\/. Posted 04 Aug 2012"},{"key":"3_CR23","unstructured":"Vaziripour, E., et al.: Is that you, Alice? A usability study of the authentication ceremony of secure messaging applications. In: Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), pp. 29\u201347 (2017)"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Weirich, D., Sasse, M.A.: Pretty good persuasion: a first step towards effective password security in the real world. In: Proceedings of the 2001 Workshop on New Security Paradigms, pp. 137\u2013143 (2001)","DOI":"10.1145\/508171.508195"},{"key":"3_CR25","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-1-84996-133-2_11","volume-title":"Social Learning Systems and Communities of Practice","author":"E Wenger","year":"2010","unstructured":"Wenger, E.: Communities of practice and social learning systems: the career of a concept. In: Blackmore, C. (ed.) Social Learning Systems and Communities of Practice, pp. 179\u2013198. Springer, London (2010). https:\/\/doi.org\/10.1007\/978-1-84996-133-2_11"},{"key":"3_CR26","unstructured":"Wu, J., Zappala, D.: When is a tree really a truck? Exploring mental models of encryption. In: Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), pp. 395\u2013409. USENIX Association, Baltimore (2018)"}],"container-title":["Lecture Notes in Computer Science","Socio-Technical Aspects in Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-10183-0_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T13:08:45Z","timestamp":1657717725000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-10183-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031101823","9783031101830"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-10183-0_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"14 July 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"STAST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Socio-Technical Aspects in Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg City","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"stast2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/stast.uni.lu\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}