{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T14:08:04Z","timestamp":1744207684852},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642389078"},{"type":"electronic","value":"9783642389085"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38908-5_16","type":"book-chapter","created":{"date-parts":[[2013,6,10]],"date-time":"2013-06-10T02:18:23Z","timestamp":1370830703000},"page":"205-222","source":"Crossref","is-referenced-by-count":8,"title":["Contextualized Web Warnings, and How They Cause Distrust"],"prefix":"10.1007","author":[{"given":"Steffen","family":"Bartsch","sequence":"first","affiliation":[]},{"given":"Melanie","family":"Volkamer","sequence":"additional","affiliation":[]},{"given":"Heike","family":"Theuerling","sequence":"additional","affiliation":[]},{"given":"Fatih","family":"Karayumak","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","volume-title":"A qualitative approach to HCI research","author":"A. Adams","year":"2008","unstructured":"Adams, A., Lunt, P., Cairns, P.: A qualitative approach to HCI research. Cambridge Univ. Press, Cambridge (2008)"},{"key":"16_CR2","unstructured":"Amer, T., Maris, J.: Signal Words and Signal Icons in Application Control and Information Technology Exception Messages \u2013 Hazard Matching and Habituation Effects. Tech. Rep. 06-05, Nothern Arizona University (2006)"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Asgharpour, F., Liu, D., Camp, L.J.: Mental Models of Computer Security Risks. In: WEIS 2007: Workshop on the Economics of Information Security (2007)","DOI":"10.1007\/978-3-540-77366-5_34"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Bartsch, S., Volkamer, M.: Towards the Systematic Development of Contextualised Security Interventions. In: Proceedings of Designing Interactive Secure Systems, BCS HCI 2012. BLIC (2012)","DOI":"10.14236\/ewic\/HCI2012.69"},{"key":"16_CR5","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/1655008.1655012","volume-title":"Proceedings of the 2009 ACM Workshop on Cloud Computing Security, CCSW 2009","author":"R. Biddle","year":"2009","unstructured":"Biddle, R., van Oorschot, P.C., Patrick, A.S., Sobey, J., Whalen, T.: Browser interfaces and extended validation SSL certificates: an empirical study. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, CCSW 2009, pp. 19\u201330. ACM, New York (2009)"},{"key":"16_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-642-23768-3_2","volume-title":"Human-Computer Interaction \u2013 INTERACT 2011","author":"C. Bravo-Lillo","year":"2011","unstructured":"Bravo-Lillo, C., Cranor, L.F., Downs, J., Komanduri, S., Sleeper, M.: Improving Computer Security Dialogs. In: Campos, P., Graham, N., Jorge, J., Nunes, N., Palanque, P., Winckler, M. (eds.) INTERACT 2011, Part IV. LNCS, vol.\u00a06949, pp. 18\u201335. Springer, Heidelberg (2011), http:\/\/www.springerlink.com\/content\/q551210n08h16970"},{"key":"16_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1007\/978-3-642-03655-2_57","volume-title":"Human-Computer Interaction \u2013 INTERACT 2009","author":"F. Keukelaere De","year":"2009","unstructured":"De Keukelaere, F., Yoshihama, S., Trent, S., Zhang, Y., Luo, L., Zurko, M.E.: Adaptive Security Dialogs for Improved Security Behavior of Users. In: Gross, T., Gulliksen, J., Kotz\u00e9, P., Oestreicher, L., Palanque, P., Prates, R.O., Winckler, M. (eds.) INTERACT 2009. LNCS, vol.\u00a05726, pp. 510\u2013523. Springer, Heidelberg (2009)"},{"key":"16_CR8","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1145\/1143120.1143131","volume-title":"SOUPS 2006: Proceedings of the Second Symposium on Usable Privacy and Security","author":"J.S. Downs","year":"2006","unstructured":"Downs, J.S., Holbrook, M.B., Cranor, L.F.: Decision strategies and susceptibility to phishing. In: SOUPS 2006: Proceedings of the Second Symposium on Usable Privacy and Security, pp. 79\u201390. ACM, New York (2006)"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Egelman, S., Cranor, L.F., Hong, J.: You\u2019ve been warned: an empirical study of the effectiveness of web browser phishing warnings. In: CHI 2008: Proceeding of the Twenty-Sixth Annual SIGCHI Conference on Human Factors in Computing Systems (2008)","DOI":"10.1145\/1357054.1357219"},{"key":"16_CR10","volume-title":"CHI 2001","author":"B.J. Fogg","year":"2001","unstructured":"Fogg, B.J., Marshall, J., Laraki, O., Osipovich, A., Varma, C., Fang, N., Paul, J., Rangnekar, A., Shon, J., Swani, P., Treinen, M.: What makes Web sites credible?: a report on a large quantitative study. In: CHI 2001. ACM, New York (2001)"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Glaser, B.G., Strauss, A.L.: The Discovery of Grounded Theory: Strategies for Qualitative Research. Aldine Transaction (1967)","DOI":"10.1097\/00006199-196807000-00014"},{"key":"16_CR12","volume-title":"The simulation heuristic","author":"D. Kahneman","year":"1982","unstructured":"Kahneman, D., Tversky, A.: The simulation heuristic. Cambridge University Press, Cambridge (1982)"},{"key":"16_CR13","unstructured":"Kauer, M., Pfeiffer, T., Volkamer, M., Theuerling, H., Bruder, R.: It is not about the design \u2013 it is about the content! Making warnings more efficient by communicating risks appropriately. In: GI SICHERHEIT 2012 Sicherheit \u2013 Schutz und Zuverl\u00e4ssigkeit (2012)"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Krol, K., Moroz, M., Sasse, M.: Don\u2019t work. Can\u2019t work? Why it\u2019s time to rethink security warnings. In: 7th International Conference on Risk and Security of Internet and Systems (CRiSIS), pp. 1\u20138 (October 2012)","DOI":"10.1109\/CRISIS.2012.6378951"},{"key":"16_CR15","unstructured":"Lazar, J., Feng, J.H., Hochheiser, H.: Research methods in human-computer interaction. Wiley (2010)"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Rothman, A.J., Kiviniemi, M.T.: Treating People With Information: an Analysis and Review of Approaches to Communicating Health Risk Information. J. Natl. Cancer Inst. Monogr. (25) (1999)","DOI":"10.1093\/oxfordjournals.jncimonographs.a024207"},{"issue":"2","key":"16_CR17","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1111\/1468-0394.00045","volume":"14","author":"G. Rugg","year":"1997","unstructured":"Rugg, G., McGeorge, P.: The sorting techniques: a tutorial paper on card sorts, picture sorts and item sorts. Expert Systems\u00a014(2), 80\u201393 (1997)","journal-title":"Expert Systems"},{"key":"16_CR18","volume-title":"SOUPS 2011: Proceedings of the 7th Symposium on Usable Privacy and Security","author":"A. Sotirakopoulos","year":"2011","unstructured":"Sotirakopoulos, A., Hawkey, K., Beznosov, K.: On the challenges in usable security lab studies: lessons learned from replicating a study on SSL warnings. In: SOUPS 2011: Proceedings of the 7th Symposium on Usable Privacy and Security. ACM, New York (2011)"},{"key":"16_CR19","unstructured":"Sunshine, J., Egelman, S., Almuhimedi, H., Atri, N., Cranor, L.F.: Crying Wolf: An Empirical Study of SSL Warning Effectiveness. In: USENIX Security 2009 (2009)"},{"key":"16_CR20","doi-asserted-by":"crossref","unstructured":"Wogalter, M.S.: Handbook of warnings. Routledge (2006)","DOI":"10.1201\/9781482289688"},{"key":"16_CR21","first-page":"601","volume-title":"CHI 2006: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"M. Wu","year":"2006","unstructured":"Wu, M., Miller, R.C., Garfinkel, S.L.: Do security toolbars actually prevent phishing attacks? In: CHI 2006: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 601\u2013610. ACM, New York (2006)"}],"container-title":["Lecture Notes in Computer Science","Trust and Trustworthy Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38908-5_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,28]],"date-time":"2020-07-28T02:16:52Z","timestamp":1595902612000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38908-5_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642389078","9783642389085"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38908-5_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}