{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T07:03:28Z","timestamp":1725865408779},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319470719"},{"type":"electronic","value":"9783319470726"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47072-6_10","type":"book-chapter","created":{"date-parts":[[2016,9,21]],"date-time":"2016-09-21T01:20:20Z","timestamp":1474420820000},"page":"146-162","source":"Crossref","is-referenced-by-count":2,"title":["Investigating the Animation of Application Permission Dialogs: A Case Study of Facebook"],"prefix":"10.1007","author":[{"given":"Yousra","family":"Javed","sequence":"first","affiliation":[]},{"given":"Mohamed","family":"Shehab","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,22]]},"reference":[{"key":"10_CR1","unstructured":"Power of visual communication (2014). http:\/\/blog.wyzowl.com\/power-visual-communication-infographic"},{"key":"10_CR2","unstructured":"Permissions with facebook login (2016). https:\/\/developers.facebook.com\/docs\/facebook-login\/permissions\/v2.2"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Bravo-Lillo, C., Komanduri, S., Cranor, L.F., Reeder, R.W., Sleeper, M., Downs, J., Schechter, S.: Your attention please: Designing security-decision uis to make genuine risks harder to ignore. In: SOUPS. New York, USA, July 2013","DOI":"10.1145\/2501604.2501610"},{"key":"10_CR4","unstructured":"Brooke, J.: Sus-a quick and dirty usability scale. Usability evaluation in industry (1996)"},{"issue":"4","key":"10_CR5","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1080\/13669870110062712","volume":"4","author":"VC Conzola","year":"2001","unstructured":"Conzola, V.C., Wogalter, M.S.: A communication-human information processing (c-hip) approach to warning effectiveness in the workplace. J. Risk Res. 4(4), 309\u2013322 (2001)","journal-title":"J. Risk Res."},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Egelman, S.: My profile is my password, verify me!: the privacy\/convenience tradeoff of facebook connect. In: SIGCHI, pp. 2369\u20132378. ACM (2013)","DOI":"10.1145\/2470654.2481328"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/978-3-319-07509-9_2","volume-title":"Universal Access in Human-Computer Interaction. Design for All and Accessibility Practice","author":"Susanne Furman","year":"2014","unstructured":"Furman, Susanne, Theofanos, Mary: Preserving privacy \u2013 more than reading a message. In: Stephanidis, Constantine, Antona, Margherita (eds.) UAHCI 2014. LNCS, vol. 8516, pp. 14\u201325. Springer, Heidelberg (2014). doi: 10.1007\/978-3-319-07509-9_2"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Harbach, M., Hettig, M., Weber, S., Smith, M.: Using personal examples to improve risk communication for security and privacy decisions. In: CHI. ACM, Toronto, Canada (2014)","DOI":"10.1145\/2556288.2556978"},{"key":"10_CR9","unstructured":"Mobile, C.: Facebook security issue: Facebook color scam (2014). http:\/\/www.cmcm.com\/blog\/2014-08-07\/348.html"},{"key":"10_CR10","doi-asserted-by":"crossref","first-page":"1724","DOI":"10.1177\/0956797610387440","volume":"21","author":"J Pratt","year":"2010","unstructured":"Pratt, J., Radulescu, P.V., Guo, R.M., Abrams, R.A.: It\u2019s alive! animate motion captures visual attention. Psychol. Sci. 21, 1724\u20131730 (2010)","journal-title":"Psychol. Sci."},{"key":"10_CR11","unstructured":"\u0160pakov, O., Miniotas, D.: Visualization of eye gaze data using heat maps (2007)"},{"key":"10_CR12","unstructured":"Steel, E., Fowler, G.A.: Facebook in privacy breach (2010). http:\/\/www.wsj.com\/articles\/SB10001424052702304772804575558484075236968"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Wang, N., Grossklags, J., Xu, H.: An online experiment of privacy authorization dialogues for social applications. In: ACM CSCW, pp. 261\u2013272 (2013)","DOI":"10.1145\/2441776.2441807"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Wang, N., Xu, H., Grossklags, J.: Third-party apps on facebook: Privacy and the illusion of control. In: ACM CHIMIT. New York, NY (2011)","DOI":"10.1145\/2076444.2076448"},{"key":"10_CR15","unstructured":"Xu, H., Wang, N., Grossklags, J.: Privacy by redesign: Alleviating privacy concerns for third-party apps (2012)"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management and Security Assurance"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47072-6_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T20:27:56Z","timestamp":1568406476000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47072-6_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319470719","9783319470726"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47072-6_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}