{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T05:08:46Z","timestamp":1750136926707,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319228457"},{"type":"electronic","value":"9783319228464"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-22846-4_7","type":"book-chapter","created":{"date-parts":[[2015,8,13]],"date-time":"2015-08-13T13:50:58Z","timestamp":1439473858000},"page":"104-122","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk Awareness"],"prefix":"10.1007","author":[{"given":"Melanie","family":"Volkamer","sequence":"first","affiliation":[]},{"given":"Karen","family":"Renaud","sequence":"additional","affiliation":[]},{"given":"Gamze","family":"Canova","sequence":"additional","affiliation":[]},{"given":"Benjamin","family":"Reinheimer","sequence":"additional","affiliation":[]},{"given":"Kristoffer","family":"Braun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,14]]},"reference":[{"key":"7_CR1","unstructured":"Mixed Content Blocking Enabled in Firefox: 23! (2013). https:\/\/blog.mozilla.org\/tanvi\/ (last Access: June 2, 2015]"},{"key":"7_CR2","unstructured":"Akhawe, D., Felt, A.P.: Alice in warningland: A large-scale field study of browser security warning effectiveness. In: Usenix Security. pp. 257\u2013272, Washington DC, 14\u201316 August 2013"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Ayres, T.J., Gross, M.M., Wood, C.T., Horst, D.P., Beyer, R.R., Robinson, J.N.: What is a warning and when will it work? In: Proceedings of the Human Factors and Ergonomics Society Annual Meeting, vol. 33, pp. 426\u2013430. SAGE Publications (1989)","DOI":"10.1518\/107118189786759615"},{"key":"7_CR4","unstructured":"Bauer, L., Bravo-Lillo, C., Cranor, L., Fragkaki, E.: Warning design guidelines. Technical report, Carnegie Mellon University (2013). CMU-CyLab-13-002"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-642-23768-3_2","volume-title":"Human-Computer Interaction \u2013 INTERACT 2011","author":"C Bravo-Lillo","year":"2011","unstructured":"Bravo-Lillo, C., Cranor, L.F., Downs, J., Komanduri, S., Sleeper, M.: Improving computer security dialogs. In: Campos, P., Graham, N., Jorge, J., Nunes, N., Palanque, P., Winckler, M. (eds.) INTERACT 2011, Part IV. LNCS, vol. 6949, pp. 18\u201335. Springer, Heidelberg (2011)"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Bravo-Lillo, C., Komanduri, S., Cranor, L.F., Reeder, R.W., Sleeper, M., Downs, J., Schechter, S.: Your attention please: designing security-decision UIs to make genuine risks harder to ignore. In: Proceedings of the Ninth Symposium on Usable Privacy and Security (SOUPS 2013), pp. 6:1\u20136:12. ACM (2013)","DOI":"10.1145\/2501604.2501610"},{"key":"7_CR7","doi-asserted-by":"crossref","DOI":"10.4324\/9780203781203","volume-title":"Cry Wolf: The Psychology of False Alarms","author":"S Breznitz","year":"2013","unstructured":"Breznitz, S.: Cry Wolf: The Psychology of False Alarms. Psychology Press, New York (2013)"},{"issue":"2","key":"7_CR8","first-page":"29","volume":"8","author":"J Brooke","year":"2013","unstructured":"Brooke, J.: SUS: a Retrospective. J. Usability Stud. 8(2), 29\u201340 (2013)","journal-title":"J. Usability Stud."},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Brustoloni, J.C., Villamar\u00edn-Salom\u00f3n, R.: Improving security decisions with polymorphic and audited dialogs. In: Proceedings of the 3rd symposium on Usable privacy and security, pp. 76\u201385. ACM (2007)","DOI":"10.1145\/1280680.1280691"},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1007\/978-3-319-11851-2_14","volume-title":"Security and Trust Management","author":"G Canova","year":"2014","unstructured":"Canova, G., Volkamer, M., Bergmann, C., Borza, R.: NoPhish: an anti-phishing education app. In: Mauw, S., Jensen, C.D. (eds.) STM 2014. LNCS, vol. 8743, pp. 188\u2013192. Springer, Heidelberg (2014)"},{"key":"7_CR11","unstructured":"Cranor, L.F.: A framework for reasoning about the human in the loop. In: Proceedings of the 1st Conference on Usability, Psychology, and Security (UPSEC 2008), pp. 1:1\u20131:15. USENIX Association (2008)"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 581\u2013590. ACM (2006)","DOI":"10.1145\/1124772.1124861"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Egelman, S., Cranor, L.F., Hong, J.: You\u2019ve been warned: an empirical study of the effectiveness of web browser phishing warnings. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1065\u20131074. ACM (2008)","DOI":"10.1145\/1357054.1357219"},{"key":"7_CR14","volume-title":"Thinking Fast and Slow","author":"D Kahneman","year":"2011","unstructured":"Kahneman, D.: Thinking Fast and Slow. Farrar Strauss, Giroux, New York (2011)"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Lin, E., Greenberg, S., Trotter, E., Ma, D., Aycock, J.: Does domain highlighting help people identify phishing sites? In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2011), pp. 2075\u20132084. ACM (2011)","DOI":"10.1145\/1978942.1979244"},{"issue":"2","key":"7_CR16","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1037\/h0024970","volume":"7","author":"EA Locke","year":"1967","unstructured":"Locke, E.A.: Relationship of success and expectation to affect on goal-seeking tasks. J. Pers. Soc. Psychol. 7(2), 125\u2013134 (1967)","journal-title":"J. Pers. Soc. Psychol."},{"key":"7_CR17","unstructured":"Maurer, M.E.: Bringing effective security warnings to mobile browsing. In: 2nd International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (in Conjunction with Pervasive 2010), Helsinki (2010)"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Maurer, M.E., De Luca, A., Kempe, S.: Using data type based security alert dialogs to raise online security awareness. In: Proceedings of the Seventh Symposium on Usable Privacy and Security, p. 2. ACM (2011)","DOI":"10.1145\/2078827.2078830"},{"issue":"1","key":"7_CR19","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1046\/j.1365-2648.1995.21010015.x","volume":"21","author":"C Meredith","year":"1995","unstructured":"Meredith, C., Edworthy, J.: Are there too many alarms in the intensive care unit? An overview of the problems. J. Adv. Nurs. 21(1), 15\u201320 (1995)","journal-title":"J. Adv. Nurs."},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Politis, I., Brewster, S., Pollick, F.: Speech tactons improve speech warnings for drivers. In: Proceedings of the 6th International Conference on Automotive User Interfaces and Interactive Vehicular Applications (AutomotiveUI 2014), pp. 4:1\u20134:8. ACM, New York (2014). http:\/\/doi.acm.org\/10.1145\/2667317.2667318","DOI":"10.1145\/2667317.2667318"},{"key":"7_CR21","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/978-3-642-39377-8_7","volume-title":"Information Assurance and Security Education and Training","author":"M Potgieter","year":"2013","unstructured":"Potgieter, M., Marais, C., Gerber, M.: Fostering content relevant information security awareness through browser extensions. In: Dodge Jr., R.C., Futcher, L. (eds.) WISE 6\/7\/8. IFIP AICT, vol. 406, pp. 58\u201367. Springer, Heidelberg (2013)"},{"issue":"6","key":"7_CR22","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1080\/08870440108405863","volume":"16","author":"RA Ruiter","year":"2001","unstructured":"Ruiter, R.A., Abraham, C., Kok, G.: Scary warnings and rational precautions: a review of the psychology of fear appeals. Psychol. Health 16(6), 613\u2013630 (2001)","journal-title":"Psychol. Health"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Schechter, S.E., Dhamija, R., Ozment, A., Fischer, I.: The emperor\u2019s new security indicators. In: IEEE Symposium on Security and Privacy (SP 2007), pp. 51\u201365. IEEE (2007)","DOI":"10.1109\/SP.2007.35"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Sheng, S., Magnien, B., Kumaraguru, P., Acquisti, A., Cranor, L.F., Hong, J., Nunge, E.: Anti-phishing Phil: the design and evaluation of a game that teaches people not to fall for phish. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, pp. 88\u201399. ACM (2007)","DOI":"10.1145\/1280680.1280692"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Shepherd, L.A., Archibald, J., Ferguson, R.I.: Reducing risky security behaviours: utilising affective feedback to educate users. In: International Conference on Cyber Forensics, Glasgow, 23\u201324 June 2014","DOI":"10.3390\/fi6040760"},{"key":"7_CR26","unstructured":"Sunshine, J., Egelman, S., Almuhimedi, H., Atri, N., Cranor, L.F.: Crying wolf: an empirical study of ssl warning effectiveness. In: USENIX Security Symposium, pp. 399\u2013416 (2009)"},{"issue":"4","key":"7_CR27","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/1330311.1330320","volume":"51","author":"R West","year":"2008","unstructured":"West, R.: The psychology of security. Commun. ACM 51(4), 34\u201340 (2008)","journal-title":"Commun. ACM"},{"issue":"1","key":"7_CR28","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1002\/j.2161-1939.2011.tb00103.x","volume":"50","author":"SS Wichmann","year":"2011","unstructured":"Wichmann, S.S.: Self-determination theory: the importance of autonomy to well-being across cultures. J. Humanistic Couns. 50(1), 16\u201326 (2011)","journal-title":"J. Humanistic Couns."},{"key":"7_CR29","doi-asserted-by":"crossref","DOI":"10.1201\/9781482289688","volume-title":"Handbook of Warnings","author":"MS Wogalter","year":"2006","unstructured":"Wogalter, M.S.: Communication-human information processing (C-HIP) model. In: Wogalter, M.S. (ed.) Handbook of Warnings. Lawrence Erlbaum Associates, Mahwah (2006)"},{"issue":"6","key":"7_CR30","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1080\/00207720210133651","volume":"33","author":"MS Wogalter","year":"2002","unstructured":"Wogalter, M.S., Conzola, V.C.: Using technology to facilitate the design and delivery of warnings. Int. J. Syst. Sci. 33(6), 461\u2013466 (2002)","journal-title":"Int. J. Syst. Sci."},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"Wogalter, M.S., Desaulniers, D.R., Brelsford, J.W.: Consumer products: how are the hazards perceived? In: Proceedings of the Human Factors and Ergonomics Society Annual Meeting, vol. 31, pp. 615\u2013619. SAGE Publications (1987)","DOI":"10.1177\/154193128703100530"},{"issue":"5","key":"7_CR32","doi-asserted-by":"crossref","first-page":"599","DOI":"10.1177\/001872088702900509","volume":"29","author":"MS Wogalter","year":"1987","unstructured":"Wogalter, M.S., Godfrey, S.S., Fontenelle, G.A., Desaulniers, D.R., Rothstein, P.R., Laughery, K.R.: Effectiveness of warnings. Hum. Factors J. Human Factors Ergon. Soc. 29(5), 599\u2013612 (1987)","journal-title":"Hum. Factors J. Human Factors Ergon. Soc."},{"issue":"1","key":"7_CR33","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1001\/archinternmed.2009.454","volume":"170","author":"MS Wolf","year":"2010","unstructured":"Wolf, M.S., Davis, T.C., Bass, P.F., Curtis, L.M., Lindquist, L.A., Webb, J.A., Bocchini, M.V., Bailey, S.C., Parker, R.M.: Improving prescription drug warnings to promote patient comprehension. Arch. Intern. Medicine 170(1), 50\u201356 (2010)","journal-title":"Arch. Intern. Medicine"},{"key":"7_CR34","doi-asserted-by":"crossref","unstructured":"Wu, M., Miller, R.C., Garfinkel, S.L.: Do security toolbars actually prevent phishing attacks? In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. pp. 601\u2013610. ACM, Montreal, 22\u201327 April 2006","DOI":"10.1145\/1124772.1124863"}],"container-title":["Lecture Notes in Computer Science","Trust and Trustworthy Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-22846-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T16:21:52Z","timestamp":1675873312000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-22846-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319228457","9783319228464"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-22846-4_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"14 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}