{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:31:24Z","timestamp":1760661084398,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031928321"},{"type":"electronic","value":"9783031928338"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-92833-8_9","type":"book-chapter","created":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T00:07:27Z","timestamp":1749514047000},"page":"141-160","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Effectiveness of\u00a0Video-Based Risk Communication for\u00a0Online DNA Data Sharing: A User Study"],"prefix":"10.1007","author":[{"given":"Lipsarani","family":"Sahoo","sequence":"first","affiliation":[]},{"given":"Yousra","family":"Javed","sequence":"additional","affiliation":[]},{"given":"Elham Al","family":"Qahtani","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Shehab","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,11]]},"reference":[{"issue":"3","key":"9_CR1","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1080\/0144929X.2012.708787","volume":"33","author":"J Abawajy","year":"2014","unstructured":"Abawajy, J.: User preference of cyber security awareness delivery methods. Behav. Inf. Technol. 33(3), 237\u2013248 (2014)","journal-title":"Behav. Inf. Technol."},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Al\u00a0Qahtani, E., Sahoo, L., Shehab, M.: The effectiveness of video messaging campaigns to use 2fa. In: International Conference on HCI, pp. 369\u2013390. Springer (2021)","DOI":"10.1007\/978-3-030-77392-2_24"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Albayram, Y., Khan, M.M.H., Fagan, M.: A study on designing video tutorials for promoting security features: a case study in the context of two-factor authentication (2fa). Int. J. Hum.-Comput Interact. 1\u201316 (2017)","DOI":"10.1080\/10447318.2017.1306765"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Albayram, Y., Liu, J., Cangonj, S.: Comparing the effectiveness of text-based and video-based delivery in motivating users to adopt a password manager. In: European Symposium on Usable Security 2021, pp. 89\u2013104 (2021)","DOI":"10.1145\/3481357.3481519"},{"issue":"2","key":"9_CR5","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1136\/tc.2009.035550","volume":"20","author":"CL Backinger","year":"2011","unstructured":"Backinger, C.L., Pilsner, A.M., Augustson, E.M., Frydl, A., Phillips, T., Rowden, J.: Youtube as a source of quitting smoking information. Tob. Control 20(2), 119\u2013122 (2011)","journal-title":"Tob. Control"},{"key":"9_CR6","unstructured":"Bada, M., Sasse, A.M., Nurse, J.R.: Cyber security awareness campaigns: why do they fail to change behaviour? arXiv preprint arXiv:1901.02672 (2019)"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Baig, K., Mohamed, R., Theus, A.L., Chiasson, S.: I\u2019m hoping they\u2019re an ethical company that won\u2019t do anything that i\u2019ll regret\": users perceptions of at-home dna testing companies. In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, CHI 2020, pp. 1\u201313. Association for Computing Machinery, New York, NY, USA (2020). https:\/\/doi.org\/10.1145\/3313831.3376800","DOI":"10.1145\/3313831.3376800"},{"key":"9_CR8","unstructured":"Bergold, J., Thomas, S.: Participatory research methods: a methodological approach in motion. Hist. Soc. Res.\/Historische Sozialforschung 191\u2013222 (2012)"},{"key":"9_CR9","unstructured":"Childers, A.: Adoptees\u2019 experiences with direct-to-consumer genetic testing: emotions, satisfaction, and motivating factors. Ph.D. thesis, University of South Carolina (2017)"},{"issue":"2","key":"9_CR10","first-page":"227","volume":"18","author":"S Donetto","year":"2015","unstructured":"Donetto, S., Pierri, P., Tsianakas, V., Robert, G.: Experience-based co-design and healthcare improvement: realizing participatory design in the public sector. Des. J. 18(2), 227\u2013248 (2015)","journal-title":"Des. J."},{"key":"9_CR11","doi-asserted-by":"publisher","unstructured":"Edge, M., Coop, G.: Attacks on genetic privacy via uploads to genealogical databases (2019). https:\/\/doi.org\/10.1101\/798272","DOI":"10.1101\/798272"},{"issue":"6","key":"9_CR12","doi-asserted-by":"publisher","first-page":"636","DOI":"10.1200\/JCO.2016.67.1503","volume":"35","author":"SW Gray","year":"2017","unstructured":"Gray, S.W., et al.: Personal genomic testing for cancer risk: results from the impact of personal genomics study. J. Clin. Oncol. 35(6), 636 (2017)","journal-title":"J. Clin. Oncol."},{"key":"9_CR13","unstructured":"Grothaus, M.: Police are using genetic testing companies to track down criminals. https:\/\/www.fastcompany.com\/40564861\/police-are-using-genetic-testing-companies-to-track-down-criminals, Accessed 18 Jan 2024"},{"key":"9_CR14","doi-asserted-by":"publisher","unstructured":"Humbert, M., Ayday, E., Hubaux, J.P., Telenti, A.: Addressing the concerns of the lacks family: quantification of kin genomic privacy, CCS 2013, pp. 1141\u20131152. ACM, New York, NY, USA (2013). https:\/\/doi.org\/10.1145\/2508859.2516707","DOI":"10.1145\/2508859.2516707"},{"key":"9_CR15","first-page":"1929","volume":"120","author":"T Jones","year":"2020","unstructured":"Jones, T., Roberts, J.L.: Genetic race? dna ancestry tests, racial identity, and the law. Colum. L. Rev. 120, 1929 (2020)","journal-title":"Colum. L. Rev."},{"issue":"6139","key":"9_CR16","doi-asserted-by":"publisher","first-page":"1388","DOI":"10.1126\/science.340.6139.1388","volume":"340","author":"J Kaiser","year":"2013","unstructured":"Kaiser, J.: Agency nixes decode\u2019s new data-mining plan. Science 340(6139), 1388\u20131389 (2013). https:\/\/doi.org\/10.1126\/science.340.6139.1388","journal-title":"Science"},{"issue":"5","key":"9_CR17","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1111\/jpim.12176","volume":"32","author":"C Lee","year":"2015","unstructured":"Lee, C., Coughlin, J.F.: Perspective: older adults\u2019 adoption of technology: an integrated approach to identifying determinants and barriers. J. Prod. Innov. Manag. 32(5), 747\u2013759 (2015)","journal-title":"J. Prod. Innov. Manag."},{"issue":"4","key":"9_CR18","doi-asserted-by":"publisher","first-page":"832","DOI":"10.1093\/hmg\/dds491","volume":"22","author":"SH Lee","year":"2013","unstructured":"Lee, S.H., et al.: Estimation and partitioning of polygenic variation captured by common snps for alzheimer\u2019s disease, multiple sclerosis and endometriosis. Hum. Mol. Genet. 22(4), 832\u2013841 (2013)","journal-title":"Hum. Mol. Genet."},{"key":"9_CR19","unstructured":"Lewis, K.: Identical twin found \u2019not guilty\u2019 of charges after dna tests unable to determine which brother committed crime. https:\/\/www.independent.co.uk\/news\/uk\/crime\/identical-twin-cleared-of-charges-as-dna-tests-unable-to-determine-which-brother-committed-crime-a6862636.html, Accessed 18 Jan 2024"},{"issue":"7","key":"9_CR20","doi-asserted-by":"publisher","first-page":"804","DOI":"10.1177\/0883073811402345","volume":"26","author":"MJ Lim Fat","year":"2011","unstructured":"Lim Fat, M.J., Doja, A., Barrowman, N., Sell, E.: Youtube videos as a teaching tool and patient resource for infantile spasms. J. Child Neurol. 26(7), 804\u2013809 (2011)","journal-title":"J. Child Neurol."},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Malakar, Y., Lacey, J., Twine, N.A., McCrea, R., Bauer, D.C.: Balancing the safeguarding of privacy and data sharing: perceptions of genomic professionals on patient genomic data ownership in australia. Eur. J. Hum. Genet. 1\u20137 (2023)","DOI":"10.1038\/s41431-022-01273-w"},{"key":"9_CR22","unstructured":"Marks, M., Li, T.: Dna donors must demand stronger protection for genetic privacy. Stat (2018)"},{"issue":"1","key":"9_CR23","first-page":"13","volume":"6","author":"MW Meyer","year":"2020","unstructured":"Meyer, M.W., Norman, D.: Changing design education for the 21st century. She Ji: J. Des. Econ. Innov. 6(1), 13\u201349 (2020)","journal-title":"She Ji: J. Des. Econ. Innov."},{"key":"9_CR24","unstructured":"Moedas, C.: Citizen science: innovation in open science, society and policy. UCL Press (2018)"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Ney: Genotype extraction and false relative attacks security risks to third-party genetic genealogy services beyond identity inference (2020)","DOI":"10.14722\/ndss.2020.23049"},{"issue":"1","key":"9_CR26","doi-asserted-by":"publisher","first-page":"146045822311521","DOI":"10.1177\/14604582231152185","volume":"29","author":"L Parvinen","year":"2023","unstructured":"Parvinen, L., Alam\u00e4ki, A., Hallikainen, H., M\u00e4ki, M.: Exploring the challenges of and solutions to sharing personal genomic data for use in healthcare. Health Inf. J. 29(1), 14604582231152184 (2023)","journal-title":"Health Inf. J."},{"key":"9_CR27","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/s40142-013-0018-2","volume":"1","author":"JS Roberts","year":"2013","unstructured":"Roberts, J.S., Ostergren, J.: Direct-to-consumer genetic testing and personal genomics services: a review of recent empirical studies. Curr. Genet. Med. Rep. 1, 182\u2013200 (2013)","journal-title":"Curr. Genet. Med. Rep."},{"key":"9_CR28","doi-asserted-by":"crossref","unstructured":"Sahoo, L., Shehab, M., Qahtani, E.A., Dev, J.: Nobody wants my stuff and it is just dna data, why should i be worried. In: Privacy Symposium: Data Protection Law International Convergence and Compliance with Innovative Technologies, pp. 155\u2013178. Springer (2022)","DOI":"10.1007\/978-3-031-09901-4_9"},{"key":"9_CR29","doi-asserted-by":"crossref","unstructured":"Sahoo, L., Shehab, M., Qahtani, E.A., Dev, J.: Nobody wants my stuff and it is just dna data, why should i be worried. In: Privacy Symposium 2022, pp. 155\u2013178 (2022)","DOI":"10.1007\/978-3-031-09901-4_9"},{"issue":"1","key":"9_CR30","first-page":"5","volume":"4","author":"E Sanders","year":"2008","unstructured":"Sanders, E., Stappers, P.J.: Co-creation and the new landscapes of design. Co-design 4(1), 5\u201318 (2008)","journal-title":"Co-design"},{"issue":"1","key":"9_CR31","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1080\/15710882.2014.888183","volume":"10","author":"E Sanders","year":"2014","unstructured":"Sanders, E., Stappers, P.J.: Probes, toolkits and prototypes: three approaches to making in codesigning. CoDesign 10(1), 5\u201314 (2014)","journal-title":"CoDesign"},{"key":"9_CR32","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/s10900-009-9153-9","volume":"34","author":"RM Sobel","year":"2009","unstructured":"Sobel, R.M., Paasche-Orlow, M.K., Waite, K.R., Rittner, S.S., Wilson, E.A., Wolf, M.S.: Asthma 1-2-3: a low literacy multimedia tool to educate african american adults about asthma. J. Community Health 34, 321\u2013327 (2009)","journal-title":"J. Community Health"},{"issue":"2","key":"9_CR33","first-page":"163","volume":"52","author":"C Spinuzzi","year":"2005","unstructured":"Spinuzzi, C.: The methodology of participatory design. Technical Commun. 52(2), 163\u2013174 (2005)","journal-title":"Technical Commun."},{"key":"9_CR34","unstructured":"Steen, M., Manschot, M., De\u00a0Koning, N.: Benefits of co-design in service design projects. Int. J. Des. 5(2) (2011)"},{"key":"9_CR35","unstructured":"Taylor, O.: 10 times identical twins tried getting away with crime. https:\/\/listverse.com\/2018\/07\/29\/10-times-identical-twins-tried-getting-away-with-crime\/, Accessed 18 Jan 2024"},{"issue":"10","key":"9_CR36","doi-asserted-by":"publisher","first-page":"771","DOI":"10.1038\/nrg1960","volume":"7","author":"BS Weir","year":"2006","unstructured":"Weir, B.S., Anderson, A.D., Hepler, A.B.: Genetic relatedness analysis: modern data and new challenges. Nat. Rev. Genet. 7(10), 771\u2013780 (2006)","journal-title":"Nat. Rev. Genet."}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-92833-8_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T17:22:10Z","timestamp":1760635330000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-92833-8_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031928321","9783031928338"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-92833-8_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"11 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gothenburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2025.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}