{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:49:17Z","timestamp":1742914157944,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319203751"},{"type":"electronic","value":"9783319203768"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20376-8_29","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T06:00:17Z","timestamp":1437372017000},"page":"323-334","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Do Graphical Cues Effectively Inform Users?"],"prefix":"10.1007","author":[{"given":"Ana","family":"Ferreira","sequence":"first","affiliation":[]},{"given":"Jean-Louis","family":"Huynen","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Koenig","sequence":"additional","affiliation":[]},{"given":"Gabriele","family":"Lenzini","sequence":"additional","affiliation":[]},{"given":"Salvador","family":"Rivas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"key":"29_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1007\/978-3-319-07620-1_27","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"A Ferreira","year":"2014","unstructured":"Ferreira, A., Huynen, J.L., Koenig, V., Lenzini, G.: Socio-technical security analysis of wireless hotspots. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 306\u2013317. Springer, Heidelberg (2014)"},{"key":"29_CR2","doi-asserted-by":"crossref","unstructured":"Jeske, D., Coventry, L., Briggs, P.: Decision justifications for wireless network selection. In: 2014 Workshop on Socio-Technical Aspects in Security and Trust (STAST), pp. 1\u20137, July 2014","DOI":"10.1109\/STAST.2014.9"},{"key":"29_CR3","volume-title":"Studies in the Way of Words","author":"P Grice","year":"1989","unstructured":"Grice, P.: Studies in the Way of Words. Harvard University Press, Cambridge (1989)"},{"key":"29_CR4","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.jtbi.2011.03.004","volume":"299","author":"DG Rand","year":"2012","unstructured":"Rand, D.G.: The promise of Mechanical Turk: how online labor markets can help theorists run behavioral experiments. J. Theor. Biol. 299, 172\u2013179 (2012)","journal-title":"J. Theor. Biol."},{"issue":"5","key":"29_CR5","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1017\/S1930297500002205","volume":"5","author":"G Paolacci","year":"2010","unstructured":"Paolacci, G., Chandler, J., Ipeirotis, P.: Running experiments on amazon Mechanical Turk. Judgm. Decis. Mak. 5(5), 411\u2013419 (2010)","journal-title":"Judgm. Decis. Mak."},{"issue":"3","key":"29_CR6","doi-asserted-by":"publisher","first-page":"e57410","DOI":"10.1371\/journal.pone.0057410","volume":"8","author":"MJC Crump","year":"2013","unstructured":"Crump, M.J.C., McDonnell, J.V., Gureckis, T.M.: Evaluating Amazon\u2019s Mechanical Turk as a tool for experimental behavioral research. PLoS One 8(3), e57410 (2013)","journal-title":"PLoS One"},{"key":"29_CR7","unstructured":"We are dynamo turker community: guidelines for academic requesters. http:\/\/wearedynamo.org\/"},{"key":"29_CR8","first-page":"1","volume-title":"Standard Occupational Classification and Coding Structure","author":"US Bureau","year":"2010","unstructured":"Bureau, U.S., Statistics, L.: Standard Occupational Classification and Coding Structure, pp. 1\u20137. Health, San Francisco (2010)"},{"key":"29_CR9","unstructured":"U.S. department of the census: current population survey interviewing manual, June 2013"},{"issue":"1","key":"29_CR10","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1177\/0038038587021001008","volume":"21","author":"J Finch","year":"1987","unstructured":"Finch, J.: The vignette technique in survey research. Sociology 21(1), 105\u2013114 (1987)","journal-title":"Sociology"},{"key":"29_CR11","unstructured":"R Development Core Team: R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna (2008). http:\/\/cran.rproject.org\/doc\/FAQ\/R-FAQ.html#Citing-R"},{"issue":"6","key":"29_CR12","doi-asserted-by":"publisher","first-page":"80","DOI":"10.2307\/3001968","volume":"1","author":"F Wilcoxon","year":"1945","unstructured":"Wilcoxon, F.: Individual comparisons by ranking methods. Biom. Bull. 1(6), 80\u201383 (1945)","journal-title":"Biom. Bull."},{"key":"29_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-3242-6","volume-title":"Generalized Linear Models","author":"P McCullagh","year":"1989","unstructured":"McCullagh, P.: Generalized Linear Models. Chapman and Hall, New York (1989)"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20376-8_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,12]],"date-time":"2023-08-12T09:47:04Z","timestamp":1691833624000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20376-8_29"}},"subtitle":["A Socio-Technical Security Study in Accessing Wifi Networks"],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319203751","9783319203768"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20376-8_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}