{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:08:07Z","timestamp":1743012487142,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319076195"},{"type":"electronic","value":"9783319076201"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07620-1_16","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T12:55:03Z","timestamp":1402404903000},"page":"172-182","source":"Crossref","is-referenced-by-count":3,"title":["Capturing Attention for Warnings about Insecure Password Fields \u2013 Systematic Development of a Passive Security Intervention"],"prefix":"10.1007","author":[{"given":"Nina","family":"Kolb","sequence":"first","affiliation":[]},{"given":"Steffen","family":"Bartsch","sequence":"additional","affiliation":[]},{"given":"Melanie","family":"Volkamer","sequence":"additional","affiliation":[]},{"given":"Joachim","family":"Vogt","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Amer, T.S., Maris, J.B.: Signal Words and Signal Icons in Application Control and Information Technology Exception Messages \u2013 Hazard Matching and Habituation Effects. Northern Arizona University (2006)","DOI":"10.2308\/jis.2007.21.2.1"},{"key":"16_CR2","unstructured":"Chou, N., et al.: Client-Side Defense Against Web-Based Identity Theft. Presented at the NDSS (2004)"},{"issue":"3","key":"16_CR3","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1037\/0033-295X.96.3.433","volume":"96","author":"J. Duncan","year":"1989","unstructured":"Duncan, J., Humphreys, G.W.: Visual search and stimulus similarity. Psychological Review\u00a096(3), 433\u2013458 (1989)","journal-title":"Psychological Review"},{"key":"16_CR4","unstructured":"Horstmann, G.: Die Unterbrechungsfunktion der \u00dcberraschung: ein neues experimentelles Paradigma und eine \u00dcberpr\u00fcfung der Automatizit\u00e4tshypothese. Uni Bielefeld (2001)"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Maurer, M.-E., et al.: Using data type based security alert dialogs to raise online security awareness. Presented at the SOUPS 2011, New York, NY, USA (2011)","DOI":"10.1145\/2078827.2078830"},{"key":"16_CR6","unstructured":"Nielsen, J.: F-Shaped Pattern For Reading Web Content (2006), \n                    \n                      http:\/\/www.nngroup.com\/articles\/f-shaped-pattern-reading-web-content"},{"key":"16_CR7","unstructured":"Ross, B., et al.: Stronger password authentication using browser extensions. Presented at Usenix security 2005, Berkeley, CA, USA (2005)"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Schechter, S.E., et al.: The Emperor\u2019s New Security Indicators. Presented at the IEEE Symposium on Security and Privacy Mai (2007)","DOI":"10.1109\/SP.2007.35"},{"issue":"1","key":"16_CR9","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1037\/0033-295X.95.1.15","volume":"95","author":"A. Treisman","year":"1988","unstructured":"Treisman, A., Gormican, S.: Feature analysis in early vision: Evidence from search asymmetries. Psychological Review\u00a095(1), 15\u201348 (1988)","journal-title":"Psychological Review"},{"key":"16_CR10","volume-title":"Two visual cortical systems","author":"G.L. Ungerleider","year":"1982","unstructured":"Ungerleider, G.L., Mishkin, L.: Two visual cortical systems. MIT Press, Cambridge (1982)"},{"key":"16_CR11","volume-title":"Software-Ergonomie","author":"J. Wandmacher","year":"1993","unstructured":"Wandmacher, J.: Software-Ergonomie. De Gruyter, Berlin (1993)"},{"key":"16_CR12","unstructured":"Whalen, T., Inkpen, K.M.: Gathering evidence: use of visual security cues in web browsers. Presented at the School of Computer Science, University of Waterloo, Waterloo, Ontario, Canada (2005)"},{"key":"16_CR13","volume-title":"Missing Links. \u00dcber gutes Webdesign","author":"T. Wirth","year":"2002","unstructured":"Wirth, T.: Missing Links. \u00dcber gutes Webdesign. Hanser Verlag, M\u00fcnchen (2002)"},{"issue":"6","key":"16_CR14","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1038\/nrn1411","volume":"5","author":"J.M. Wolfe","year":"2004","unstructured":"Wolfe, J.M., Horowitz, T.S.: What attributes guide the deployment of visual attention and how do they do it? Nat. Rev. Neurosci.\u00a05(6), 495\u2013501 (2004)","journal-title":"Nat. Rev. Neurosci."},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Wu, M., et al.: Do security toolbars actually prevent phishing attacks? Presented at the CHI 2006, New York, NY, USA (2006)","DOI":"10.1145\/1124772.1124863"},{"key":"16_CR16","unstructured":"Zwicky, F.: Discovery, Invention, Research Through the Morphological Approach. The Macmillian Company, Toronto (1969)"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07620-1_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T23:13:03Z","timestamp":1582413183000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07620-1_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319076195","9783319076201"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07620-1_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}