{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T17:14:18Z","timestamp":1769879658099,"version":"3.49.0"},"publisher-location":"Cham","reference-count":70,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031358210","type":"print"},{"value":"9783031358227","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-35822-7_8","type":"book-chapter","created":{"date-parts":[[2023,7,8]],"date-time":"2023-07-08T23:04:57Z","timestamp":1688857497000},"page":"101-121","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Towards Improving the\u00a0Efficacy of\u00a0Windows Security Notifier for\u00a0Apps from\u00a0Unknown Publishers: The Role of\u00a0Rhetoric"],"prefix":"10.1007","author":[{"given":"Ankit","family":"Shrestha","sequence":"first","affiliation":[]},{"given":"Rizu","family":"Paudel","sequence":"additional","affiliation":[]},{"given":"Prakriti","family":"Dumaru","sequence":"additional","affiliation":[]},{"given":"Mahdi Nasrullah","family":"Al-Ameen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,9]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Al-Ameen, M.N., Kocabas, H.: \u201ci cannot do anything\": user\u2019s behavior and protection strategy upon losing, or identifying unauthorized access to online account. In: Symposium on Usable Privacy and Security (Poster Session) (2020)","DOI":"10.1007\/978-3-030-77392-2_20"},{"issue":"4","key":"8_CR2","doi-asserted-by":"publisher","first-page":"203","DOI":"10.2478\/popets-2021-0067","volume":"2021","author":"MN Al-Ameen","year":"2021","unstructured":"Al-Ameen, M.N., Kocabas, H., Nandy, S., Tamanna, T.: We, three brothers have always known everything of each other: a cross-cultural study of sharing digital devices and online accounts. Proc. Priv. Enhancing Technol. 2021(4), 203\u2013224 (2021)","journal-title":"Proc. Priv. Enhancing Technol."},{"issue":"4","key":"8_CR3","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1080\/19393555.2018.1505008","volume":"27","author":"A Amran","year":"2018","unstructured":"Amran, A., Zaaba, Z.F., Mahinderjit Singh, M.K.: Habituation effects in computer security warning. Inf. Secur. J. Glob. Perspect. 27(4), 192\u2013204 (2018)","journal-title":"Inf. Secur. J. Glob. Perspect."},{"key":"8_CR4","doi-asserted-by":"publisher","first-page":"624","DOI":"10.1016\/j.procs.2017.12.198","volume":"124","author":"A Amran","year":"2017","unstructured":"Amran, A., Zaaba, Z.F., Singh, M.M., Marashdih, A.W.: Usable security: revealing end-users comprehensions on security warnings. Procedia Comput. Sci. 124, 624\u2013631 (2017)","journal-title":"Procedia Comput. Sci."},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Anderson, B.B., Kirwan, C.B., Jenkins, J.L., Eargle, D., Howard, S., Vance, A.: How polymorphic warnings reduce habituation in the brain: insights from an FMRI study. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp. 2883\u20132892 (2015)","DOI":"10.1145\/2702123.2702322"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Baek, E., Choo, H.J., Wei, X., Yoon, S.Y.: Understanding the virtual tours of retail stores: how can store brand experience promote visit intentions? Int. J. Retail Distrib. Manage. (2020)","DOI":"10.1108\/IJRDM-09-2019-0294"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Bartsch, S., Volkamer, M.: Towards the systematic development of contextualized security interventions1. In: The 26th BCS Conference on Human Computer Interaction, vol. 26, pp. 1\u20134 (2012)","DOI":"10.14236\/ewic\/HCI2012.69"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/978-3-642-38908-5_16","volume-title":"Trust and Trustworthy Computing","author":"S Bartsch","year":"2013","unstructured":"Bartsch, S., Volkamer, M., Theuerling, H., Karayumak, F.: Contextualized web warnings, and how they cause distrust. In: Huth, M., Asokan, N., \u010capkun, S., Flechais, I., Coles-Kemp, L. (eds.) Trust 2013. LNCS, vol. 7904, pp. 205\u2013222. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38908-5_16"},{"key":"8_CR9","volume-title":"Understanding Your Users: A Practical Guide to User Research Methods","author":"K Baxter","year":"2015","unstructured":"Baxter, K., Courage, C., Caine, K.: Understanding Your Users: A Practical Guide to User Research Methods, 2nd edn. Morgan Kaufmann Publishers Inc., San Francisco (2015)","edition":"2"},{"issue":"3","key":"8_CR10","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1093\/pan\/mpr057","volume":"20","author":"AJ Berinsky","year":"2012","unstructured":"Berinsky, A.J., Huber, G.A., Lenz, G.S.: Evaluating online labor markets for experimental research: Amazon. com\u2019s mechanical Turk. Polit. Anal. 20(3), 351\u2013368 (2012)","journal-title":"Polit. Anal."},{"key":"8_CR11","volume-title":"Transforming Qualitative Information: Thematic Analysis and Code Development","author":"RE Boyatzis","year":"1998","unstructured":"Boyatzis, R.E.: Transforming Qualitative Information: Thematic Analysis and Code Development. Sage Publications, Thousand Oaks (1998)"},{"issue":"3","key":"8_CR12","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/BF00154696","volume":"6","author":"AC Braet","year":"1992","unstructured":"Braet, A.C.: Ethos, pathos and logos in Aristotle\u2019s rhetoric: a re-examination. Argumentation 6(3), 307\u2013320 (1992)","journal-title":"Argumentation"},{"issue":"2","key":"8_CR13","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1191\/1478088706qp063oa","volume":"3","author":"V Braun","year":"2006","unstructured":"Braun, V., Clarke, V.: Using thematic analysis in psychology. Qual. Res. Psychol. 3(2), 77\u2013101 (2006)","journal-title":"Qual. Res. Psychol."},{"issue":"2","key":"8_CR14","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MSP.2010.198","volume":"9","author":"C Bravo-Lillo","year":"2010","unstructured":"Bravo-Lillo, C., Cranor, L.F., Downs, J., Komanduri, S.: Bridging the gap in computer security warnings: a mental model approach. IEEE Secur. Priv. 9(2), 18\u201326 (2010)","journal-title":"IEEE Secur. Priv."},{"key":"8_CR15","unstructured":"Brinks, M.: Ethos, pathos, logos, Kairos: the modes of persuasion and how to use them. Prep Scholar (2019). Accessed 20 Aug 2021"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Brustoloni, J.C., Villamar\u00edn-Salom\u00f3n, R.: Improving security decisions with polymorphic and audited dialogs. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, pp. 76\u201385 (2007)","DOI":"10.1145\/1280680.1280691"},{"key":"8_CR17","unstructured":"Buhrmester, M., Kwang, T., Gosling, S.D.: Amazon\u2019s mechanical Turk: a new source of inexpensive, yet high-quality data? (2016)"},{"issue":"5","key":"8_CR18","doi-asserted-by":"publisher","first-page":"987","DOI":"10.1016\/j.chb.2010.02.012","volume":"26","author":"H Cho","year":"2010","unstructured":"Cho, H., Lee, J.S., Chung, S.: Optimistic bias about online privacy risks: testing the moderating effects of perceived controllability and prior experience. Comput. Hum. Behav. 26(5), 987\u2013995 (2010)","journal-title":"Comput. Hum. Behav."},{"issue":"1","key":"8_CR19","first-page":"189","volume":"3","author":"\u00dcD Demird\u00f6\u011fen","year":"2010","unstructured":"Demird\u00f6\u011fen, \u00dc.D.: The roots of research in (political) persuasion: ethos, pathos, logos and the Yale studies of persuasive communications. Int. J. Soc. Inquiry 3(1), 189\u2013201 (2010)","journal-title":"Int. J. Soc. Inquiry"},{"issue":"2","key":"8_CR20","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1002\/job.1962","volume":"36","author":"JA DeSimone","year":"2015","unstructured":"DeSimone, J.A., Harms, P.D., DeSimone, A.J.: Best practice recommendations for data screening. J. Organ. Behav. 36(2), 171\u2013181 (2015)","journal-title":"J. Organ. Behav."},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Egelman, S., Cranor, L.F., Hong, J.: You\u2019ve been warned: an empirical study of the effectiveness of web browser phishing warnings. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1065\u20131074 (2008)","DOI":"10.1145\/1357054.1357219"},{"key":"8_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/978-3-642-39884-1_5","volume-title":"Financial Cryptography and Data Security","author":"S Egelman","year":"2013","unstructured":"Egelman, S., Schechter, S.: The importance of being earnest [in security warnings]. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 52\u201359. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39884-1_5"},{"issue":"3","key":"8_CR23","doi-asserted-by":"publisher","first-page":"168781401664190","DOI":"10.1177\/1687814016641902","volume":"8","author":"YM Fang","year":"2016","unstructured":"Fang, Y.M., Chen, K.M., Huang, Y.J.: Emotional reactions of different interface formats: comparing digital and traditional board games. Adv. Mech. Eng. 8(3), 1687814016641902 (2016)","journal-title":"Adv. Mech. Eng."},{"key":"8_CR24","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/s40299-012-0041-1","volume":"22","author":"P Fernandes","year":"2013","unstructured":"Fernandes, P., Leite, C., Mouraz, A., Figueiredo, C.: Curricular contextualization: tracking the meanings of a concept. Asia Pac. Educ. Res. 22, 417\u2013425 (2013)","journal-title":"Asia Pac. Educ. Res."},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Good, N., et al.: Stopping spyware at the gate: a user study of privacy, notice and spyware. In: Proceedings of the 2005 Symposium on Usable Privacy and Security, pp. 43\u201352 (2005)","DOI":"10.1145\/1073001.1073006"},{"issue":"2","key":"8_CR26","first-page":"283","volume":"2","author":"N Good","year":"2006","unstructured":"Good, N., Grossklags, J., Thaw, D., Perzanowski, A., Mulligan, D.K., Konstan, J.: User choices and regret: understanding users\u2019 decision process about consensually acquired spyware. I\/S J. Law Policy Inf. Soc. 2(2), 283\u2013344 (2006)","journal-title":"I\/S J. Law Policy Inf. Soc."},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"Good, N.S., Grossklags, J., Mulligan, D.K., Konstan, J.A.: Noticing notice: a large-scale experiment on the timing of software license agreements. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 607\u2013616 (2007)","DOI":"10.1145\/1240624.1240720"},{"issue":"1","key":"8_CR28","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1177\/009182968301100108","volume":"11","author":"K Haleblian","year":"1983","unstructured":"Haleblian, K.: The problem of contextualization. Missiology 11(1), 95\u2013111 (1983)","journal-title":"Missiology"},{"key":"8_CR29","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.chb.2014.11.009","volume":"44","author":"S Heidig","year":"2015","unstructured":"Heidig, S., M\u00fcller, J., Reichelt, M.: Emotional design in multimedia learning: differentiation on relevant design features and their effects on emotions and learning. Comput. Hum. Behav. 44, 81\u201395 (2015)","journal-title":"Comput. Hum. Behav."},{"key":"8_CR30","doi-asserted-by":"crossref","unstructured":"Higgins, C., Walker, R.: Ethos, logos, pathos: strategies of persuasion in social\/environmental reports. In: Accounting Forum, vol. 36, pp. 194\u2013208. Elsevier (2012)","DOI":"10.1016\/j.accfor.2012.02.003"},{"key":"8_CR31","doi-asserted-by":"crossref","unstructured":"Hora, A., Anquetil, N., Ducasse, S., Allier, S.: Domain specific warnings: are they any better? In: 2012 28th IEEE International Conference on Software Maintenance (ICSM), pp. 441\u2013450. IEEE (2012)","DOI":"10.1109\/ICSM.2012.6405305"},{"key":"8_CR32","doi-asserted-by":"crossref","unstructured":"Ipeirotis, P.G., Provost, F., Wang, J.: Quality management on amazon mechanical Turk. In: Proceedings of the ACM SIGKDD Workshop on Human Computation, pp. 64\u201367 (2010)","DOI":"10.1145\/1837885.1837906"},{"key":"8_CR33","doi-asserted-by":"crossref","unstructured":"Jones, C.P., Robinson, S.J., Sabadosh, N., Bishop, D., Koyani, S.: How can rhetoric and argumentation help us make the case for UCD? In: CHI 2006 Extended Abstracts on Human Factors in Computing Systems, pp. 415\u2013418 (2006)","DOI":"10.1145\/1125451.1125541"},{"key":"8_CR34","unstructured":"Kaiser, B., Wei, J., Lucherini, E., Lee, K., Matias, J.N., Mayer, J.: Adapting security warnings to counter online disinformation. In: 30th USENIX Security Symposium (USENIX Security 2021), pp. 1163\u20131180 (2021)"},{"issue":"2","key":"8_CR35","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1111\/apps.12108","volume":"67","author":"FY Kung","year":"2018","unstructured":"Kung, F.Y., Kwok, N., Brown, D.J.: Are attention check questions a threat to scale validity? Appl. Psychol. 67(2), 264\u2013283 (2018)","journal-title":"Appl. Psychol."},{"issue":"7","key":"8_CR36","doi-asserted-by":"publisher","first-page":"1003","DOI":"10.1002\/acp.1602","volume":"24","author":"T Lenzner","year":"2010","unstructured":"Lenzner, T., Kaczmirek, L., Lenzner, A.: Cognitive burden of survey questions and response times: a psycholinguistic experiment. Appl. Cogn. Psychol. 24(7), 1003\u20131020 (2010)","journal-title":"Appl. Cogn. Psychol."},{"issue":"8","key":"8_CR37","doi-asserted-by":"publisher","first-page":"1264","DOI":"10.1080\/00140139.2013.802019","volume":"56","author":"MF Lesch","year":"2013","unstructured":"Lesch, M.F., Powell, W.R., Horrey, W.J., Wogalter, M.S.: The use of contextual cues to improve warning symbol comprehension: making the connection for older adults. Ergonomics 56(8), 1264\u20131279 (2013)","journal-title":"Ergonomics"},{"issue":"1","key":"8_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1959022.1959023","volume":"18","author":"G Lindgaard","year":"2011","unstructured":"Lindgaard, G., Dudek, C., Sen, D., Sumegi, L., Noonan, P.: An exploration of relations between visual appeal, trustworthiness and perceived usability of homepages. ACM Trans. Comput. Hum. Interact. (TOCHI) 18(1), 1\u201330 (2011)","journal-title":"ACM Trans. Comput. Hum. Interact. (TOCHI)"},{"key":"8_CR39","doi-asserted-by":"crossref","unstructured":"Mshvenieradze, T.: Logos ethos and pathos in political discourse. Theor. Pract. Lang. Stud. 3(11) (2013)","DOI":"10.4304\/tpls.3.11.1939-1945"},{"key":"8_CR40","unstructured":"Norman, D.: The Design of Everyday Things: Revised and expanded edition. Basic books (2013)"},{"issue":"4","key":"8_CR41","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1207\/s15327051hci1904_1","volume":"19","author":"DA Norman","year":"2004","unstructured":"Norman, D.A.: Introduction to this special section on beauty, goodness, and usability. Hum. Comput. Interact. 19(4), 311\u2013318 (2004)","journal-title":"Hum. Comput. Interact."},{"key":"8_CR42","unstructured":"Norman, D.A., Ortony, A.: Designers and users: two perspectives on emotion and design. In: Symposium on Foundations of Interaction Design, pp. 1\u201313 (2003)"},{"key":"8_CR43","doi-asserted-by":"publisher","DOI":"10.4324\/9781315785233","volume-title":"Mind and Its Evolution: A Dual Coding Theoretical Approach","author":"A Paivio","year":"2014","unstructured":"Paivio, A.: Mind and Its Evolution: A Dual Coding Theoretical Approach. Psychology Press, London (2014)"},{"key":"8_CR44","unstructured":"Parkinson, M.: The power of visual communication. Billion Dollar Graphics (2012)"},{"issue":"3","key":"8_CR45","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1177\/0091552111416227","volume":"39","author":"D Perin","year":"2011","unstructured":"Perin, D.: Facilitating student learning through contextualization: a review of evidence. Commun. Coll. Rev. 39(3), 268\u2013295 (2011)","journal-title":"Commun. Coll. Rev."},{"key":"8_CR46","doi-asserted-by":"crossref","unstructured":"Petelka, J., Zou, Y., Schaub, F.: Put your warning where your link is: improving and evaluating email phishing warnings. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, pp. 1\u201315 (2019)","DOI":"10.1145\/3290605.3300748"},{"key":"8_CR47","doi-asserted-by":"publisher","first-page":"797","DOI":"10.3389\/fpsyg.2018.00797","volume":"9","author":"D Peters","year":"2018","unstructured":"Peters, D., Calvo, R.A., Ryan, R.M.: Designing for motivation, engagement and wellbeing in digital experience. Front. Psychol. 9, 797 (2018)","journal-title":"Front. Psychol."},{"key":"8_CR48","doi-asserted-by":"crossref","unstructured":"Reeder, R.W., Felt, A.P., Consolvo, S., Malkin, N., Thompson, C., Egelman, S.: An experience sampling study of user reactions to browser warnings in the field. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1\u201313 (2018)","DOI":"10.1145\/3173574.3174086"},{"issue":"4","key":"8_CR49","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1207\/S15327957PSPR0504_2","volume":"5","author":"P Rozin","year":"2001","unstructured":"Rozin, P., Royzman, E.B.: Negativity bias, negativity dominance, and contagion. Pers. Soc. Psychol. Rev. 5(4), 296\u2013320 (2001)","journal-title":"Pers. Soc. Psychol. Rev."},{"key":"8_CR50","unstructured":"Sasse, M.A., Krol, K., Moroz, M.: Don\u2019t work. can\u2019t work? why it\u2019s time to rethink security warnings. In: 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS), pp. 1\u20138. IEEE Computer Society (2012)"},{"key":"8_CR51","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/978-3-319-07668-3_37","volume-title":"Design, User Experience, and Usability. Theories, Methods, and Tools for Designing the User Experience","author":"M Schrepp","year":"2014","unstructured":"Schrepp, M., Hinderks, A., Thomaschewski, J.: Applying the user experience questionnaire (UEQ) in different evaluation scenarios. In: Marcus, A. (ed.) DUXU 2014. LNCS, vol. 8517, pp. 383\u2013392. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-07668-3_37"},{"key":"8_CR52","doi-asserted-by":"crossref","unstructured":"Seo, H., Xiong, A., Lee, D.: Trust it or not: effects of machine-learning warnings in helping individuals mitigate misinformation. In: Proceedings of the 10th ACM Conference on Web Science, pp. 265\u2013274 (2019)","DOI":"10.1145\/3292522.3326012"},{"key":"8_CR53","doi-asserted-by":"crossref","unstructured":"Shahid, F., Kamath, S., Sidotam, A., Jiang, V., Batino, A., Vashistha, A.: It matches my worldview: examining perceptions and attitudes around fake videos. In: CHI Conference on Human Factors in Computing Systems, pp. 1\u201315 (2022)","DOI":"10.1145\/3491102.3517646"},{"key":"8_CR54","unstructured":"Share, N.M.: Operating system market share (2009). https:\/\/marketshare.hitslink.com\/operating-system-market-share.aspx"},{"key":"8_CR55","doi-asserted-by":"crossref","unstructured":"Sharek, D., Swofford, C., Wogalter, M.: Failure to recognize fake internet popup warning messages. In: Proceedings of the Human Factors and Ergonomics Society Annual Meeting, vol. 52, pp. 557\u2013560. SAGE Publications Sage CA: Los Angeles, CA (2008)","DOI":"10.1177\/154193120805200610"},{"issue":"CSCW2","key":"8_CR56","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3555763","volume":"6","author":"A Shrestha","year":"2022","unstructured":"Shrestha, A., Graham, D.M., Dumaru, P., Paudel, R., Searle, K.A., Al-Ameen, M.N.: Understanding the behavior, challenges, and privacy risks in digital technology use by nursing professionals. Proc. ACM Hum. Comput. Interact. 6(CSCW2), 1\u201322 (2022)","journal-title":"Proc. ACM Hum. Comput. Interact."},{"key":"8_CR57","unstructured":"Sunshine, J., Egelman, S., Almuhimedi, H., Atri, N., Cranor, L.F.: Crying wolf: an empirical study of SSL warning effectiveness. In: USENIX Security Symposium, pp. 399\u2013416. Montreal (2009)"},{"key":"8_CR58","doi-asserted-by":"crossref","unstructured":"Sweller, J.: Cognitive load theory: recent theoretical advances (2010)","DOI":"10.1017\/CBO9780511844744.004"},{"key":"8_CR59","doi-asserted-by":"crossref","unstructured":"Sweller, J.: Cognitive load theory. In: Psychology of Learning and Motivation, vol. 55, pp. 37\u201376. Elsevier (2011)","DOI":"10.1016\/B978-0-12-387691-1.00002-8"},{"issue":"3","key":"8_CR60","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1037\/0033-2909.134.3.383","volume":"134","author":"A Vaish","year":"2008","unstructured":"Vaish, A., Grossmann, T., Woodward, A.: Not all emotions are created equal: the negativity bias in social-emotional development. Psychol. Bull. 134(3), 383 (2008)","journal-title":"Psychol. Bull."},{"key":"8_CR61","unstructured":"Vance, A.: The fog of warnings: how non-essential notifications blur with security warnings. In: Symposium on Usable Privacy and Security (SOUPS) (2019)"},{"key":"8_CR62","doi-asserted-by":"crossref","unstructured":"Vance, A., Kirwan, B., Bjornn, D., Jenkins, J., Anderson, B.B.: What do we really know about how habituation to warnings occurs over time? a longitudinal FMRI study of habituation and polymorphic warnings. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 2215\u20132227 (2017)","DOI":"10.1145\/3025453.3025896"},{"key":"8_CR63","unstructured":"Warkentin, M., Xu, Z., Mutchler, L.A.: I\u2019m safer than you: the role of optimism bias in personal it risk assessments. In: Proceedings of, pp. 1\u201332 (2013)"},{"issue":"5","key":"8_CR64","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1509\/jmr.11.0368","volume":"49","author":"B Weijters","year":"2012","unstructured":"Weijters, B., Baumgartner, H.: Misresponse to reversed and negated items in surveys: a review. J. Mark. Res. 49(5), 737\u2013747 (2012)","journal-title":"J. Mark. Res."},{"key":"8_CR65","doi-asserted-by":"crossref","unstructured":"Wu, M., Miller, R.C., Garfinkel, S.L.: Do security toolbars actually prevent phishing attacks? In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 601\u2013610 (2006)","DOI":"10.1145\/1124772.1124863"},{"issue":"1","key":"8_CR66","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1515\/mlt-2013-0026","volume":"10","author":"T Wyatt","year":"2015","unstructured":"Wyatt, T.: Understanding the process of contextualization. Multicultural Learn. Teach. 10(1), 111\u2013132 (2015)","journal-title":"Multicultural Learn. Teach."},{"key":"8_CR67","unstructured":"Xu, H., Rosson, M.B., Carroll, J.M.: Increasing the persuasiveness of it security communication: effects of fear appeals and self-view. In: Workshop on Usable IT Security Management, Symposium on Usable Privacy and Security (SOUPS), Pittsburgh, PA (2007)"},{"issue":"25","key":"8_CR68","first-page":"26","volume":"18","author":"ZF Zaaba","year":"2015","unstructured":"Zaaba, Z.F., Boon, T.K.: Examination on usability issues of security warning dialogs. Age 18(25), 26\u201335 (2015)","journal-title":"Age"},{"key":"8_CR69","doi-asserted-by":"crossref","unstructured":"Zaaba, Z.F., Lim Xin Yi, C., Amran, A., Omar, M.A.: Harnessing the challenges and solutions to improve security warnings: a review. Sensors 21(21), 7313 (2021)","DOI":"10.3390\/s21217313"},{"key":"8_CR70","unstructured":"Zaaba, Z., Furnell, S., Dowland, P., Stengel, I.: Assessing the usability of application-level security warnings. In: Proceedings of the 11th Security Conference (Security Assurance & Privacy) (2012)"}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-35822-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T20:10:49Z","timestamp":1710360649000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-35822-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031358210","9783031358227"],"references-count":70,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-35822-7_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"9 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2023.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7472","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1578","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"396","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}