{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:09:58Z","timestamp":1743127798687,"version":"3.40.3"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319584591"},{"type":"electronic","value":"9783319584607"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-58460-7_10","type":"book-chapter","created":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T11:08:42Z","timestamp":1494587322000},"page":"143-159","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Assessing the Impact of Affective Feedback on End-User Security Awareness"],"prefix":"10.1007","author":[{"given":"Lynsay A.","family":"Shepherd","sequence":"first","affiliation":[]},{"given":"Jacqueline","family":"Archibald","sequence":"additional","affiliation":[]},{"given":"Robert Ian","family":"Ferguson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,13]]},"reference":[{"key":"10_CR1","unstructured":"Li, Y., Siponen, M.: A call for research on home users information security behaviour. In: PACIS 2011, Proceedings, p. 112 (2011)"},{"key":"10_CR2","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.cose.2004.07.001","volume":"24","author":"JM Stanton","year":"2005","unstructured":"Stanton, J.M., et al.: Analysis of end user security behaviors. Comput. Secur. 24, 124\u2013133 (2005). Elsevier","journal-title":"Comput. Secur."},{"issue":"3","key":"10_CR3","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/MIC.2008.50","volume":"12","author":"B Payne","year":"2008","unstructured":"Payne, B., Edwards, W.: A brief introduction to usable security. IEEE Internet Comput. 12(3), 13\u201321 (2008)","journal-title":"IEEE Internet Comput."},{"key":"10_CR4","first-page":"45","volume":"10","author":"M Fetscherin","year":"2009","unstructured":"Fetscherin, M.: Importance of cultural and risk aspects in music piracy: a cross-national comparison among university students. J. Electron. Commer. Res. 10, 45\u201355 (2009). http:\/\/www.csulb.edu\/journals\/jecr\/issues\/20091\/Paper4.pdf","journal-title":"J. Electron. Commer. Res."},{"key":"10_CR5","volume-title":"Social Engineering: The Art of Human Hacking","author":"C Hadnagy","year":"2011","unstructured":"Hadnagy, C.: Social Engineering: The Art of Human Hacking. Wiley Publishing, Indianapolis (2011). pp. 23\u201324"},{"issue":"5","key":"10_CR6","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1016\/j.cose.2012.04.004","volume":"31","author":"K Padayachee","year":"2012","unstructured":"Padayachee, K.: Taxonomy of compliant information security behavior. Comput. Secur. 31(5), 673\u2013680 (2012). http:\/\/dx.doi.org\/10.1016\/j.cose.2012.04.004","journal-title":"Comput. Secur."},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Shay, R., et al.: Designing password policies for strength and usability. ACM Trans. Inf. Syst. Secur. 18(4) (2016). http:\/\/doi.org\/10.1145\/2891411","DOI":"10.1145\/2891411"},{"key":"10_CR8","unstructured":"Balduzzi, M.: Attacking the privacy of social network users. HITBSECCONF2011, Malaysia (2011). http:\/\/conference.hitb.org\/hitbsecconf2011kul\/materials\/D1T1%20%20Marco%20Balduzzi%20-%20Attacking%20the%20Privacy%20of%20Social%20Network%20Users.pdf. Accessed 21 Sept 2012"},{"issue":"3","key":"10_CR9","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1111\/j.1745-6606.2009.01148.x","volume":"43","author":"GR Milne","year":"2009","unstructured":"Milne, G.R., Labrecque, L.I., Cromer, C.: Toward an understanding of the online consumer\u2019s risky behavior and protection practices. J. Consum. Aff. 43(3), 449\u2013473 (2009). http:\/\/doi.org\/10.1111\/j.1745-6606.2009.01148.x","journal-title":"J. Consum. Aff."},{"issue":"1","key":"10_CR10","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1111\/j.1745-6606.2006.00071.x","volume":"41","author":"R Larose","year":"2007","unstructured":"Larose, R., Rifon, N.J.: Promoting i-safety: effects of privacy warnings and privacy seals on risk assessment and online privacy behavior. J. Consum. Aff. 41(1), 127\u2013149 (2007). doi:10.1111\/j.1745-6606.2006.00071.x","journal-title":"J. Consum. Aff."},{"key":"10_CR11","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1111\/j.1745-6606.2004.tb00865.x","volume":"38","author":"GR Milne","year":"2004","unstructured":"Milne, G.R., Rohm, A.J., Bahl, S.: Consumers\u2019 protection of online privacy and identity. J. Consum. Aff. 38, 217\u2013232 (2004). doi:10.1111\/j.1745-6606.2004.tb00865.x","journal-title":"J. Consum. Aff."},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Farahmand, F., et al.: Risk perceptions of information security: a measurement study. In: Proceedings of the 2009 International Conference on Computational Science and Engineering, CSE 2009, vol. 3, pp. 462\u2013469 (2009). http:\/\/dx.doi.org\/10.1109\/CSE.2009.449","DOI":"10.1109\/CSE.2009.449"},{"issue":"2","key":"10_CR13","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/BF00143739","volume":"9","author":"B Fischoff","year":"1978","unstructured":"Fischoff, B., et al.: How safe is safe enough? A psychometric study of attitudes towards technological risks and benefits. Policy Sci. 9(2), 127\u2013152 (1978)","journal-title":"Policy Sci."},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Takemura, T.: Empirical analysis of behavior on information security. In: Proceedings of the 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing, ITHINGSCPSCOM, pp. 358\u2013363 (2011). http:\/\/dx.doi.org\/10.1109\/iThings\/CPSCom.2011.8","DOI":"10.1109\/iThings\/CPSCom.2011.8"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"San-Jose, P., Rodriguez, S.: Study on information security and e-Trust in Spanish households. In: Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS 2011, pp. 1\u20136 (2011). http:\/\/doi.acm.org\/10.1145\/1978672.1978673","DOI":"10.1145\/1978672.1978673"},{"key":"10_CR16","doi-asserted-by":"publisher","unstructured":"Hill, R., Donaldson, D.R.: Bridging the trust gap: integrating models of behavior and perception. In: NSPW 2015 Proceedings of the 2015 New Security Paradigms Workshop, pp. 148\u2013155 (2015). doi:10.1145\/2841113.2841125","DOI":"10.1145\/2841113.2841125"},{"issue":"1","key":"10_CR17","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.cose.2005.12.004","volume":"25","author":"S Furnell","year":"2006","unstructured":"Furnell, S., et al.: The challenges of understanding and using security: a survey of end-users. Comput. Secur. 25(1), 27\u201335 (2006). doi:10.1016\/j.cose.2005.12.004","journal-title":"Comput. Secur."},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Dhamija, R., Tygar, J.: The battle against phishing: dynamic security skins. In: Symposium on Usable Privacy and Security (SOUPS 2005), pp. 1\u201312 (2005). http:\/\/cups.cs.cmu.edu\/soups\/2005\/2005proceedings\/p77-dhamija.pdf","DOI":"10.1145\/1073001.1073009"},{"key":"10_CR19","unstructured":"Sheng, S.: Anti-phishing phil: the design and evaluation of a game that teaches people not to fall for phish. In: Symposium on Usable Privacy and Security (SOUPS 2007), pp. 1\u201312 (2007). http:\/\/cups.cs.cmu.edu\/soups\/2007\/proceedings\/p88_sheng.pdf"},{"key":"10_CR20","unstructured":"Kumaraguru, P., et. al.: School of phish: a real-world evaluation of anti-phishing training. In: Symposium on Usable Privacy and Security (SOUPS 2009), pp. 1\u201312 (2009). http:\/\/cups.cs.cmu.edu\/soups\/2009\/proceedings\/a3-kumaraguru.pdf"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Canova, G., Volkamer, M., Bergmann, C., Reinheimer, B.: Nophish app evaluation: lab and retention study. In: NDSS Workshop on Usable Security (2015)","DOI":"10.14722\/usec.2015.23009"},{"key":"10_CR22","unstructured":"Besmer, A.: Social applications: exploring a more secure framework. In: Symposium on Usable Privacy and Security (SOUPS 2009), pp. 1\u201310 (2009). http:\/\/cups.cs.cmu.edu\/soups\/2009\/proceedings\/a2-besmer.pdf"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Maurer, M., De Luca, A., Kempe, S.: Using data type based security alert dialogs to raise online security awareness. In: Symposium on Usable Privacy and Security (SOUPS 2011), pp. 1\u201313 (2011). http:\/\/cups.cs.cmu.edu\/soups\/2011\/proceedings\/a2_Maurer.pdf","DOI":"10.1145\/2078827.2078830"},{"key":"10_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/978-3-319-22846-4_7","volume-title":"Trust and Trustworthy Computing","author":"M Volkamer","year":"2015","unstructured":"Volkamer, M., Renaud, K., Canova, G., Reinheimer, B., Braun, K.: Design and field evaluation of PassSec: raising and sustaining web surfer risk awareness. In: Conti, M., Schunter, M., Askoxylakis, I. (eds.) Trust 2015. LNCS, vol. 9229, pp. 104\u2013122. Springer, Cham (2015). doi:10.1007\/978-3-319-22846-4_7"},{"key":"10_CR25","doi-asserted-by":"publisher","DOI":"10.1037\/e526112012-054","volume-title":"Affective Computing","author":"RW Picard","year":"1997","unstructured":"Picard, R.W.: Affective Computing. MIT Press, Cambridge (1997). p. 15"},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"McDarby, G., Condron, J., Hughes, D., Augenblick, N.: Affective feedback. Media Lab Europe (2004). http:\/\/medialabeurope.org\/mindgames\/publications\/publicationAffectiveFeedbackEnablingTechnologies.pdf. Accessed 22 May 2012","DOI":"10.1016\/B978-0-443-07247-5.50010-9"},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"Robison, J., McQuiggan, S., Lester, J.: Evaluating the consequences of affective feedback in intelligent tutoring systems. In: Proceedings of International Conference on Affective Computing and Intelligent Interaction (ACII 2009), Amsterdam, Netherlands, 10\u201312 September 2009, pp. 37\u201342 (2009)","DOI":"10.1109\/ACII.2009.5349555"},{"key":"10_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"731","DOI":"10.1007\/11573548_94","volume-title":"Affective Computing and Intelligent Interaction","author":"L Hall","year":"2005","unstructured":"Hall, L., Woods, S., Aylett, R., Newall, L., Paiva, A.: Achieving empathic engagement through affective interaction with synthetic characters. In: Tao, J., Tan, T., Picard, Rosalind W. (eds.) ACII 2005. LNCS, vol. 3784, pp. 731\u2013738. Springer, Heidelberg (2005). doi:10.1007\/11573548_94"},{"key":"10_CR29","unstructured":"Ur, B., et al.: How does your password measure up? The effect of strength meters on password creation. In: Security 2012 Proceedings of the 21st USENIX Conference on Security Symposium (2012)"},{"issue":"2","key":"10_CR30","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1177\/002202217300400201","volume":"4","author":"FM Adams","year":"1973","unstructured":"Adams, F.M., Osgood, C.E.: A cross-cultural study of the affective meanings of color. J. Cross-Cultural Psychol. 4(2), 135\u2013156 (1973)","journal-title":"J. Cross-Cultural Psychol."},{"issue":"1","key":"10_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1006\/ijhc.1999.0325","volume":"52","author":"D Dehn","year":"2012","unstructured":"Dehn, D., Van Mulken, S.: The impact of animated interface agents: a review of empirical research. Int. J. Hum.-Comput. Stud. 52(1), 1\u201322 (2012). http:\/\/dx.doi.org\/10.1006\/ijhc.1999.0325","journal-title":"Int. J. Hum.-Comput. Stud."},{"issue":"2","key":"10_CR32","first-page":"79","volume":"32","author":"G Buba\u0161","year":"2008","unstructured":"Buba\u0161, G., Orehova, T., Konecki, M.: Factors and predictors of online security and privacy behavior. J. Inf. Organ. Sci. 32(2), 79\u201398 (2008)","journal-title":"J. Inf. Organ. Sci."},{"key":"10_CR33","unstructured":"HpHosts (2016). http:\/\/www.hosts-file.net\/"},{"key":"10_CR34","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/2.989930","volume":"35","author":"KD Fenstermacher","year":"2002","unstructured":"Fenstermacher, K.D., Ginsburg, M.A.: Lightweight framework for cross-application user monitoring. IEEE Comput. 35, 51\u201358 (2002)","journal-title":"IEEE Comput."},{"key":"10_CR35","unstructured":"Nielsen, F.: A new ANEW: evaluation of a word list for sentiment analysis in microblogs. In: Proceedings of the ESWC2011 Workshop on \u2018Making Sense of Microposts\u2019: Big Things Come in Small Packages. CEUR Workshop Proceedings, vol. 718, pp. 93\u201398 (2011)"},{"key":"10_CR36","unstructured":"Association For Psychological Science: Stop On Red! The Effects of Color May Lie Deep in Evolution (2011). http:\/\/www.psychologicalscience.org\/index.php\/news\/releases\/stop-on-red-a-monkey-study-suggests-that-the-effects-of-color-lie-deep-in-evolution.html"},{"key":"10_CR37","doi-asserted-by":"publisher","first-page":"1273","DOI":"10.1080\/02699931.2012.656583","volume":"26","author":"V Sacharin","year":"2012","unstructured":"Sacharin, V., Sander, D., Scherer, K.R.: The perception of changing emotion expressions. Cogn. Emot. 26, 1273\u20131300 (2012). http:\/\/doi.org\/10.1080\/02699931.2012.656583","journal-title":"Cogn. Emot."},{"key":"10_CR38","doi-asserted-by":"crossref","unstructured":"Ekman, P.: Basic emotions. Cognition (1999). http:\/\/doi.org\/10.1002\/0470013494.ch3","DOI":"10.1002\/0470013494.ch3"},{"key":"10_CR39","unstructured":"Mozilla: The Future of Developing Firefox Add-ons (2015). https:\/\/blog.mozilla.org\/addons\/2015\/08\/21\/the-future-of-developing-firefox-add-ons\/"},{"key":"10_CR40","unstructured":"Mozilla: Designed to protect your privacy (2017). https:\/\/www.mozilla.org\/en-GB\/firefox\/desktop\/trust\/"},{"key":"10_CR41","unstructured":"Office for National Statistics: Internet users in the UK (2016). http:\/\/www.ons.gov.uk\/businessindustryandtrade\/itandinternetindustry\/bulletins\/internetusers\/2016#recent-internet-use-is-on-the-increase-for-those-aged-65-and-over"},{"key":"10_CR42","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1136\/pgmj.2005.040857","volume":"971","author":"SM Salvi","year":"2006","unstructured":"Salvi, S.M., Akhtar, S., Currie, Z.: Ageing changes in the eye. Postgrad. Med. J. 971, 581\u2013587 (2006). http:\/\/doi.org\/10.1136\/pgmj.2005.040857","journal-title":"Postgrad. Med. J."}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-58460-7_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T01:54:27Z","timestamp":1625104467000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-58460-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319584591","9783319584607"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-58460-7_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"13 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human Aspects of Information Security, Privacy, and Trust","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vancouver, BC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"has2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}