{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:24:22Z","timestamp":1772119462748,"version":"3.50.1"},"reference-count":101,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T00:00:00Z","timestamp":1745884800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T00:00:00Z","timestamp":1745884800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Ionian University"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,6]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Contemporary research has highlighted the need to specify the competences that individuals need to possess in order to protect their privacy against the potential risks of the internet, beyond mere awareness. The reassessment of conventional strategies for enhancing knowledge and skills for privacy protection has directed research attention towards the design and development of innovative educational interventions. To address this gap, in this paper we explore the effectiveness of educational escape rooms in enhancing users' privacy competencies. The study experimentally tested a 2D digital escape room which we designed to improve five specific privacy skills among 81 adult participants. The empirical findings show significant improvement in all the competencies tested: the ability to install and customize safeguards, the ability to perceive privacy risk, self-control, the ability to perceive privacy and privacy concerns. This demonstrates the potential of escape rooms as innovative tools for privacy learning, suggesting implications for designers of educational games and privacy software. This investigation contributes novel insights into privacy education by being one of the first studies to implement and test a privacy-focused escape room.<\/jats:p>","DOI":"10.1007\/s10207-025-01037-9","type":"journal-article","created":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T11:26:07Z","timestamp":1745925967000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Educational escape rooms for raising information privacy competences: An empirical validation"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5608-3317","authenticated-orcid":false,"given":"Thanos","family":"Papaioannou","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1117-9646","authenticated-orcid":false,"given":"Spyridon Eftychios","family":"Kokotos","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2200-3651","authenticated-orcid":false,"given":"Aggeliki","family":"Tsohou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,29]]},"reference":[{"issue":"1","key":"1037_CR1","doi-asserted-by":"publisher","first-page":"171","DOI":"10.4236\/ce.2016.71017","volume":"7","author":"CS Lin","year":"2016","unstructured":"Lin, C.S.: Educating students\u2019 privacy decision making through information ethics curriculum. Creat. Educ. 7(1), 171\u2013179 (2016). https:\/\/doi.org\/10.4236\/ce.2016.71017","journal-title":"Creat. Educ."},{"issue":"2","key":"1037_CR2","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1111\/j.1745-6606.2004.tb00865.x","volume":"38","author":"GR Milne","year":"2004","unstructured":"Milne, G.R., Rohm, A.J., Bahl, S.: Consumers\u2019 protection of online privacy and identity. J. Consum. Aff. 38(2), 217\u2013232 (2004). https:\/\/doi.org\/10.1111\/j.1745-6606.2004.tb00865.x","journal-title":"J. Consum. Aff."},{"key":"1037_CR3","unstructured":"Gorman S.: Reclaiming information privacy online. Colonial Academic Alliance Undergraduate Res. J., 4 (1):4, (2015). Available at: http:\/\/scholarworks.wm.edu\/caaurj\/vol4\/iss1\/4\/"},{"issue":"5","key":"1037_CR4","doi-asserted-by":"publisher","first-page":"668","DOI":"10.1108\/ICS-08-2018-0099","volume":"27","author":"R Lavranou","year":"2019","unstructured":"Lavranou, R., Tsohou, A.: Developing and validating a common body of knowledge for information privacy. ICS 27(5), 668\u2013686 (2019). https:\/\/doi.org\/10.1108\/ICS-08-2018-0099","journal-title":"ICS"},{"key":"1037_CR5","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-031-17926-6_3","volume-title":"Trust","author":"T Papaioannou","year":"2022","unstructured":"Papaioannou, T., Tsohou, A., Bounias, G., Karagiannis, S.: A constructive approach for raising information privacy competences: the case of escape room games. In: Katsikas, S., Furnell, S. (eds.) Trust, pp. 33\u201349. Springer International Publishing, Privacy and Security in Digital Business, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-17926-6_3"},{"key":"1037_CR6","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/978-3-031-56326-3_16","volume-title":"ICT Systems Security and Privacy Protection","author":"A Soumelidou","year":"2024","unstructured":"Soumelidou, A., Tsohou, A.: Towards an information privacy competency model for the usage of mobile applications. In: Meyer, N., Grocholewska-Czury\u0142o, A. (eds.) ICT Systems Security and Privacy Protection, pp. 222\u2013235. Springer Nature Switzerland, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-56326-3_16"},{"key":"1037_CR7","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1007\/978-3-031-33080-3_42","volume-title":"Research Challenges in Information Science: Information Science and the Connected World","author":"A Soumelidou","year":"2023","unstructured":"Soumelidou, A., Papaioannou, T.: An information privacy competency model for online consumers. In: Nurcan, S., Opdahl, A.L., Mouratidis, H., Tsohou, A. (eds.) Research Challenges in Information Science: Information Science and the Connected World, pp. 593\u2013602. Springer Nature Switzerland, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-33080-3_42"},{"key":"1037_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/978-3-030-86586-3_8","volume-title":"Trust, Privacy and Security in Digital Business","author":"A Tsohou","year":"2021","unstructured":"Tsohou, A.: Towards an information privacy and personal data protection competency model for citizens. In: Fischer-H\u00fcbner, S., Lambrinoudakis, C., Kotsis, G., Tjoa, A.M., Khalil, I. (eds.) Trust, Privacy and Security in Digital Business. Lecture Notes in Computer Science, pp. 112\u2013125. Springer International Publishing, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-86586-3_8"},{"key":"1037_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2021.101592","volume":"61","author":"A Soumelidou","year":"2021","unstructured":"Soumelidou, A., Tsohou, A.: Towards the creation of a profile of the information privacy aware user through a systematic literature review of information privacy awareness. Telemat. Inf. 61, 101592 (2021). https:\/\/doi.org\/10.1016\/j.tele.2021.101592","journal-title":"Telemat. Inf."},{"issue":"2","key":"1037_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2619091","volume":"32","author":"W Enck","year":"2014","unstructured":"Enck, W., Gilbert, P., Chun, B.-G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst. 32(2), 1\u201329 (2014). https:\/\/doi.org\/10.1145\/2619091","journal-title":"ACM Trans. Comput. Syst."},{"key":"1037_CR11","unstructured":"Ghazinour K., Matwin S., and Sokolova M.: YOURPRIVACYPROTECTOR, A recommender system for privacy settings in social networks. arXiv preprint arXiv:1602.01937, (2016)"},{"key":"1037_CR12","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-64483-7_1","volume-title":"Lecture Notes in Computer Science","author":"M Hatamian","year":"2017","unstructured":"Hatamian, M., Serna, J., Rannenberg, K., Igler, B.: FAIR: fuzzy alarming index rule for privacy analysis in smartphone apps. Trust, privacy and security in digital business. In: Lopez, J., Fischer-H\u00fcbner, S., Lambrinoudakis, C. (eds.) Lecture Notes in Computer Science, pp. 3\u201318. Springer International Publishing, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-64483-7_1"},{"key":"1037_CR13","doi-asserted-by":"publisher","unstructured":"Aktypi A., Nurse J. R. C., and Goldsmith M.: Unwinding ariadne\u2019s identity thread: privacy risks with fitness trackers and online social networks. In: Proceedings of the 2017 on Multimedia Privacy and Security, in MPS \u201917. New York, NY, USA: Association for Computing Machinery, Jul. 2017, pp. 1\u201311. https:\/\/doi.org\/10.1145\/3137616.3137617.","DOI":"10.1145\/3137616.3137617"},{"key":"1037_CR14","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1007\/978-3-319-91521-0_36","volume-title":"Social Computing and Social Media User Experience and Behavior. Lecture Notes in Computer Science","author":"B Tadic","year":"2018","unstructured":"Tadic, B., Rohde, M., Wulf, V.: CyberActivist: tool for raising awareness on privacy and security of social media use for activists. In: Meiselwitz, G. (ed.) Social Computing and Social Media User Experience and Behavior. Lecture Notes in Computer Science, pp. 498\u2013510. Springer International Publishing, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-91521-0_36"},{"key":"1037_CR15","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-99100-5_1","volume-title":"IFIP Advances in Information and Communication Technology","author":"S Pape","year":"2022","unstructured":"Pape, S.: Challenges for designing serious games on security and privacy awareness. Privacy and identity management. between data protection and security. In: Friedewald, M., Krenn, S., Schiering, I., Schiffner, S. (eds.) IFIP Advances in Information and Communication Technology, pp. 3\u201316. Springer International Publishing, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-99100-5_1"},{"key":"1037_CR16","unstructured":"Cetto A. et al.: Friend inspector: a serious game to enhance privacy awareness in social networks. Feb. 20, 2014, arXiv: arXiv:1402.5878. Accessed: Jun. 04, 2022. [Online]. Available: http:\/\/arxiv.org\/abs\/1402.5878"},{"issue":"3","key":"1037_CR17","doi-asserted-by":"publisher","first-page":"414","DOI":"10.24908\/ss.v12i3.4958","volume":"12","author":"K Raynes-Goldie","year":"2014","unstructured":"Raynes-Goldie, K., Allen, M.: Gaming privacy: a Canadian case study of a children\u2019s co-created privacy literacy game. Surveill. Soc. 12(3), 414\u2013426 (2014). https:\/\/doi.org\/10.24908\/ss.v12i3.4958","journal-title":"Surveill. Soc."},{"key":"1037_CR18","doi-asserted-by":"publisher","unstructured":"Suknot A., Chavez T., Rackley N., and Kelley P. G.: Immaculacy: a game of privacy. In: Proceedings of the First ACM SIGCHI Annual Symposium on Computer-Human Interaction in Play, in CHI PLAY \u201914. New York, NY, USA: Association for Computing Machinery, Jul. 2014, pp. 383\u2013386. https:\/\/doi.org\/10.1145\/2658537.2662971.","DOI":"10.1145\/2658537.2662971"},{"issue":"6","key":"1037_CR19","doi-asserted-by":"publisher","first-page":"66","DOI":"10.9790\/7388-05616670","volume":"5","author":"D Bada","year":"2015","unstructured":"Bada, D., Olusegun, S.: Constructivism learning theory: a paradigm for teaching and learning. J. Res. Method Educ. 5(6), 66\u201370 (2015). https:\/\/doi.org\/10.9790\/7388-05616670","journal-title":"J. Res. Method Educ."},{"key":"1037_CR20","doi-asserted-by":"publisher","unstructured":"Karagiannis S., Papaioannou T., Magkos E., and Tsohou A.: Game-based information security\/privacy education and awareness: theory and practice. Information Systems, vol. 402, M. Themistocleous, M. Papadaki, and M. M. Kamal, Eds., In Lecture Notes in Business Information Processing, vol. 402. , Cham: Springer International Publishing, 2020, pp. 509\u2013525. https:\/\/doi.org\/10.1007\/978-3-030-63396-7_34.","DOI":"10.1007\/978-3-030-63396-7_34"},{"issue":"1","key":"1037_CR21","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1080\/00094056.2018.1420363","volume":"94","author":"S Nicholson","year":"2018","unstructured":"Nicholson, S.: Creating engaging escape rooms for the classroom. Child. Educ. 94(1), 44\u201349 (2018). https:\/\/doi.org\/10.1080\/00094056.2018.1420363","journal-title":"Child. Educ."},{"key":"1037_CR22","doi-asserted-by":"publisher","unstructured":"Papaioannou T., Tsohou A., Karyda M., and Karagiannis S.: Requirements for an information privacy pedagogy based on the constructivism learning theory. In Proceedings of the 17th International Conference on Availability, Reliability and Security, in ARES \u201922. New York, NY, USA: Association for Computing Machinery, Aug. 2022, pp. 1\u20138. https:\/\/doi.org\/10.1145\/3538969.3544425.","DOI":"10.1145\/3538969.3544425"},{"key":"1037_CR23","doi-asserted-by":"publisher","unstructured":"Gerber N., Gerber P., Drews H., Kirchner E., Schlegel N., Schmidt T., Scholz L.: FoxIT: enhancing mobile users\u2019 privacy behavior by increasing knowledge and awareness. In Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust, in STAST \u201917. New York, NY, USA: Association for Computing Machinery, Sep. 2018, pp. 53\u201363. https:\/\/doi.org\/10.1145\/3167996.3167999.","DOI":"10.1145\/3167996.3167999"},{"key":"1037_CR24","doi-asserted-by":"publisher","DOI":"10.1108\/03090590910993571","author":"J Winterton","year":"2009","unstructured":"Winterton, J.: Competence across Europe: highest common factor or lowest common denominator? J. Eur. Ind. Train. (2009). https:\/\/doi.org\/10.1108\/03090590910993571","journal-title":"J. Eur. Ind. Train."},{"key":"1037_CR25","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1701","author":"P Holtkamp","year":"2015","unstructured":"Holtkamp, P.: Competency requirements of global software development conceptualization, contex0tualization, and consequences. Jyv\u00e4skyl\u00e4 Stud. Comput., Finlandia. (2015). https:\/\/doi.org\/10.1002\/smr.1701","journal-title":"Jyv\u00e4skyl\u00e4 Stud. Comput., Finlandia."},{"key":"1037_CR26","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.jss.2014.12.010","volume":"101","author":"P Holtkamp","year":"2015","unstructured":"Holtkamp, P., Jokinen, J.P., Pawlowski, J.M.: Soft competency requirements in requirements engineering, software design, implementation, and testing. J. Syst. Softw. 101, 136\u2013146 (2015). https:\/\/doi.org\/10.1016\/j.jss.2014.12.010","journal-title":"J. Syst. Softw."},{"key":"1037_CR27","volume-title":"Industrial organizational psychology: understanding the workplace","author":"P Levy","year":"2009","unstructured":"Levy, P.: Industrial organizational psychology: understanding the workplace. Macmillan, Newyork (2009)"},{"issue":"12","key":"1037_CR28","doi-asserted-by":"publisher","first-page":"1500","DOI":"10.3217\/jucs-009-12-1500","volume":"9","author":"T Ley","year":"2003","unstructured":"Ley, T., Albert, D.: Identifying employee competencies in dynamic work domains: methodological considerations and a case study. J. Univ. Comput. Sci. 9(12), 1500\u20131518 (2003). https:\/\/doi.org\/10.3217\/jucs-009-12-1500","journal-title":"J. Univ. Comput. Sci."},{"issue":"1","key":"1037_CR29","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1016\/j.eswa.2009.05.064","volume":"37","author":"Y-T Lee","year":"2010","unstructured":"Lee, Y.-T.: Exploring high-performers\u2019 required competencies. Expert Syst. Appl. 37(1), 434\u2013439 (2010). https:\/\/doi.org\/10.1016\/j.eswa.2009.05.064","journal-title":"Expert Syst. Appl."},{"key":"1037_CR30","volume-title":"Competence at Work models for superior performance","author":"LM Spencer","year":"2008","unstructured":"Spencer, L.M., Spencer, P.S.M.: Competence at Work models for superior performance. John Wiley & Sons, Hoboken (2008)"},{"issue":"3","key":"1037_CR31","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1504\/IJICBM.2018.090909","volume":"16","author":"J Kansal","year":"2018","unstructured":"Kansal, J., Singhal, S.: Development of a competency model for enhancing the organisational effectiveness in a knowledge-based organisation. Int. J. Indian Cult. Bus. Manag. 16(3), 287\u2013301 (2018). https:\/\/doi.org\/10.1504\/IJICBM.2018.090909","journal-title":"Int. J. Indian Cult. Bus. Manag."},{"key":"1037_CR32","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.chb.2014.09.033","volume":"41","author":"R Moll","year":"2014","unstructured":"Moll, R., Pieschl, S., Bromme, R.: Competent or clueless? Users\u2019 knowledge and misconceptions about their online privacy management. Comput. Hum. Behav. 41, 212\u2013219 (2014). https:\/\/doi.org\/10.1016\/j.chb.2014.09.033","journal-title":"Comput. Hum. Behav."},{"key":"1037_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106382","volume":"110","author":"L Desimpelaere","year":"2020","unstructured":"Desimpelaere, L., Hudders, L., Van de Sompel, D.: Knowledge as a strategy for privacy protection: how a privacy literacy training affects children\u2019s online disclosure behavior. Comput. Hum. Behav. 110, 106382 (2020). https:\/\/doi.org\/10.1016\/j.chb.2020.106382","journal-title":"Comput. Hum. Behav."},{"issue":"7","key":"1037_CR34","doi-asserted-by":"publisher","first-page":"851","DOI":"10.1016\/j.im.2017.01.001","volume":"54","author":"TL James","year":"2017","unstructured":"James, T.L., Wallace, L., Warkentin, M., Kim, B.C., Collignon, S.E.: Exposing others\u2019 information on online social networks (OSNs): perceived shared risk, its determinants, and its influence on OSN privacy control use. Inf. Manag. 54(7), 851\u2013865 (2017)","journal-title":"Inf. Manag."},{"issue":"1","key":"1037_CR35","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.cbpra.2020.11.002","volume":"29","author":"SM Schueller","year":"2022","unstructured":"Schueller, S.M., Armstrong, C.M., Neary, M., Ciulla, R.P.: An introduction to core competencies for the use of mobile apps in cognitive and behavioral practice. Cogn. Behav. Pract. 29(1), 69\u201380 (2022)","journal-title":"Cogn. Behav. Pract."},{"key":"1037_CR36","unstructured":"International Working Group on Digital Education, \u201cPersonal Data Protection Competency Framework for School Students: Intended to help Educators,\u201d presented at the International Conference of Privacy and Data Protection Commissioners, European Data Protection Supervisor, 2016. Accessed: Oct. 12, 2024. [Online]. Available: http:\/\/www.edps.europa.eu\/sites\/default\/files\/publication\/16-10-18_resolution-competency-framework_en.pdf"},{"key":"1037_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2020.103989","volume":"158","author":"AR Lauricella","year":"2020","unstructured":"Lauricella, A.R., Herdzina, J., Robb, M.: Early childhood educators\u2019 teaching of digital citizenship competencies. Comput. Educ. 158, 103989 (2020). https:\/\/doi.org\/10.1016\/j.compedu.2020.103989","journal-title":"Comput. Educ."},{"key":"1037_CR38","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1016\/j.compedu.2018.08.019","volume":"128","author":"H-L Chou","year":"2019","unstructured":"Chou, H.-L., Liu, Y.-L., Chou, C.: Privacy behavior profiles of underage facebook users. Comput. Educ. 128, 473\u2013485 (2019). https:\/\/doi.org\/10.1016\/j.compedu.2018.08.019","journal-title":"Comput. Educ."},{"key":"1037_CR39","unstructured":"Abramova O., Wagner A., Krasnova H., and Buxmann P.: Understanding self-disclosure on social networking sites-a literature review. In: AMCIS 2017 Proceedings, Aug. 2017, [Online]. Available https:\/\/aisel.aisnet.org\/amcis2017\/AdoptionIT\/Presentations\/30\/"},{"key":"1037_CR40","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.chb.2014.12.012","volume":"45","author":"L Nemec Zlatolas","year":"2015","unstructured":"Nemec Zlatolas, L., Welzer, T., Heri\u010dko, M., H\u00f6lbl, M.: Privacy antecedents for SNS self-disclosure: the case of Facebook\u201d. Compu. Human Behav. 45, 158\u2013167 (2015). https:\/\/doi.org\/10.1016\/j.chb.2014.12.012","journal-title":"Compu. Human Behav."},{"key":"1037_CR41","doi-asserted-by":"publisher","DOI":"10.1016\/j.chbr.2020.100034","volume":"2","author":"A Skalkos","year":"2020","unstructured":"Skalkos, A., Tsohou, A., Karyda, M., Kokolakis, S.: Identifying the values associated with users\u2019 behavior towards anonymity tools through means-end analysis. Comput. Human Behav. Rep. 2, 100034 (2020). https:\/\/doi.org\/10.1016\/j.chbr.2020.100034","journal-title":"Comput. Human Behav. Rep."},{"key":"1037_CR42","unstructured":"P. T. Costa Jr and R. R. McCrae, \u201cA Five-Factor theory of personality.,\u201d 1999, Accessed: Oct. 12, 2024. [Online]. Available: https:\/\/psycnet.apa.org\/record\/1999-04371-005"},{"key":"1037_CR43","doi-asserted-by":"publisher","unstructured":"Soto C., A. Kronauer A., and Liang J: Five-factor model of personality. In: The Encyclopedia of Adulthood and Aging, S.K. Whitbourne (Ed.). https:\/\/doi.org\/10.1002\/9781118521373.wbeaa014","DOI":"10.1002\/9781118521373.wbeaa014"},{"issue":"11","key":"1037_CR44","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1080\/10447318.2015.1067479","volume":"31","author":"JV Chen","year":"2015","unstructured":"Chen, J.V., Widjaja, A.E., Yen, D.C.: Need for affiliation, need for popularity, self-esteem, and the moderating effect of Big Five personality traits affecting individuals\u2019 self-disclosure on Facebook. Int. J. Human-Comput. Interact. 31(11), 815\u2013831 (2015). https:\/\/doi.org\/10.1080\/10447318.2015.1067479","journal-title":"Int. J. Human-Comput. Interact."},{"issue":"4","key":"1037_CR45","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1016\/j.ijinfomgt.2016.03.003","volume":"36","author":"T Wang","year":"2016","unstructured":"Wang, T., Duong, T.D., Chen, C.C.: Intention to disclose personal information via mobile applications: a privacy calculus perspective. Int. J. Inf. Manage. 36(4), 531\u2013542 (2016). https:\/\/doi.org\/10.1016\/j.ijinfomgt.2016.03.003","journal-title":"Int. J. Inf. Manage."},{"key":"1037_CR46","doi-asserted-by":"crossref","unstructured":"Wagner A., Wessels N., Buxmann P., and Krasnova H.: Putting a price tag on personal information - a literature review. (2018). Accessed 17 Jun. 2022. [Online]. Available: http:\/\/hdl.handle.net\/10125\/50362","DOI":"10.24251\/HICSS.2018.474"},{"issue":"3","key":"1037_CR47","doi-asserted-by":"publisher","first-page":"20","DOI":"10.4101\/jvwr.v9i3.7244","volume":"9","author":"V Marone","year":"2016","unstructured":"Marone, V.: Playful constructivism: making sense of digital games for learning and creativity through play, design, and participation. J. Virtual Worlds Res. 9(3), 20 (2016). https:\/\/doi.org\/10.4101\/jvwr.v9i3.7244","journal-title":"J. Virtual Worlds Res."},{"key":"1037_CR48","unstructured":"McGonigal J.: Reality is broken: Why Games Make Us Better and How They Can Change the World. Penguin, (2011)"},{"issue":"2","key":"1037_CR49","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1080\/14682753.2015.1041807","volume":"16","author":"M Leaning","year":"2015","unstructured":"Leaning, M.: A study of the use of games and gamification to enhance student engagement, experience and achievement on a theory-based course of an undergraduate media degree. J. Media Pract. 16(2), 155\u2013170 (2015). https:\/\/doi.org\/10.1080\/14682753.2015.1041807","journal-title":"J. Media Pract."},{"issue":"1","key":"1037_CR50","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1111\/j.1467-8535.2009.01024.x","volume":"41","author":"S De Freitas","year":"2010","unstructured":"De Freitas, S., Rebolledo-Mendez, G., Liarokapis, F., Magoulas, G., Poulovassilis, A.: Learning as immersive experiences: using the four-dimensional framework for designing and evaluating immersive learning experiences in a virtual world: learning as immersive experiences. Br. J. Edu. Technol. 41(1), 69\u201385 (2010). https:\/\/doi.org\/10.1111\/j.1467-8535.2009.01024.x","journal-title":"Br. J. Edu. Technol."},{"issue":"3","key":"1037_CR51","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/j.compedu.2005.11.007","volume":"46","author":"S de Freitas","year":"2006","unstructured":"de Freitas, S., Oliver, M.: How can exploratory learning with games and simulations within the curriculum be most effectively evaluated? Comput. Educ. 46(3), 249\u2013264 (2006). https:\/\/doi.org\/10.1016\/j.compedu.2005.11.007","journal-title":"Comput. Educ."},{"issue":"2","key":"1037_CR52","doi-asserted-by":"publisher","first-page":"e305","DOI":"10.1542\/peds.2007-3134","volume":"122","author":"PM Kato","year":"2008","unstructured":"Kato, P.M., Cole, S.W., Bradlyn, A.S., Pollock, B.H.: A video game improves behavioral outcomes in adolescents and young adults with cancer: a randomized trial. Pediatrics 122(2), e305\u2013e317 (2008). https:\/\/doi.org\/10.1542\/peds.2007-3134","journal-title":"Pediatrics"},{"key":"1037_CR53","doi-asserted-by":"publisher","unstructured":"Rebolledo-Mendez G., Avramides K., de Freitas S., and Memarzia K: Societal impact of a serious game on raising public awareness: the case of FloodSim. In: Proceedings of the 2009 ACM SIGGRAPH Symposium on Video Games, in Sandbox \u201909. New Orleans, Louisiana: Association for Computing Machinery, Aug. 2009, pp. 15\u201322. https:\/\/doi.org\/10.1145\/1581073.1581076.","DOI":"10.1145\/1581073.1581076"},{"issue":"1","key":"1037_CR54","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1111\/1467-9248.12049","volume":"63","author":"D Barnard-Wills","year":"2015","unstructured":"Barnard-Wills, D., Ashenden, D.: Playing with privacy: games for education and communication in the politics of online privacy. Polit. Stud. 63(1), 142\u2013160 (2015). https:\/\/doi.org\/10.1111\/1467-9248.12049","journal-title":"Polit. Stud."},{"key":"1037_CR55","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.ijhcs.2019.07.012","volume":"132","author":"M Williams","year":"2019","unstructured":"Williams, M., Nurse, J.R.C., Creese, S.: (Smart)Watch Out! encouraging privacy-protective behavior through interactive games. Int. J. Hum Comput Stud. 132, 121\u2013137 (2019). https:\/\/doi.org\/10.1016\/j.ijhcs.2019.07.012","journal-title":"Int. J. Hum Comput Stud."},{"issue":"4","key":"1037_CR56","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1109\/TLT.2018.2881193","volume":"12","author":"L Bioglio","year":"2019","unstructured":"Bioglio, L., Capecchi, S., Peiretti, F., Sayed, D., Torasso, A., Pensa, R.G.: A social network simulation game to raise awareness of privacy among school children. IEEE Trans. Learn. Technol. 12(4), 456\u2013469 (2019). https:\/\/doi.org\/10.1109\/TLT.2018.2881193","journal-title":"IEEE Trans. Learn. Technol."},{"issue":"3","key":"1037_CR57","doi-asserted-by":"publisher","first-page":"73","DOI":"10.17083\/ijsg.v4i3.180","volume":"4","author":"SJ Clarke","year":"2017","unstructured":"Clarke, S.J., Peel, D.J., Arnab, S., Morini, L., Keegan, H., Wood, O.: EscapED: a framework for creating educational escape rooms and interactive games to for higher\/further education. Int. J. Serious Games 4(3), 73\u201386 (2017). https:\/\/thecodex.ca\/wp-content\/uploads\/2016\/08\/00511Wiemker-et-al-Paper-Escape-Room-Games.pdf","journal-title":"Int. J. Serious Games"},{"key":"1037_CR58","doi-asserted-by":"publisher","unstructured":"Wiemker M., Elumir E., Clare A.: Escape room games: \u201ccan you transform an unpleasant situation into a pleasant one? J.\u00a0Haag,\u00a0J.\u00a0Wei\u00dfenb\u00f6ck,\u00a0M.W.\u00a0Gruber,\u00a0M.\u00a0Christian,\u00a0F.\u00a0Freisleben-Teutscher\u00a0(Eds.),\u00a0Game based learning,\u00a0Fachhochschule st P\u00f6lten GmbH,\u00a0St. P\u00f6lten, Austria, pp.\u00a055\u201368 (2015). Available online at: https:\/\/doi.org\/10.17083\/ijsg.v4i3.180","DOI":"10.17083\/ijsg.v4i3.180"},{"key":"1037_CR59","doi-asserted-by":"publisher","first-page":"100681","DOI":"10.1016\/j.tsc.2020.100681","volume":"37","author":"S-Y Huang","year":"2020","unstructured":"Huang, S.-Y., Kuo, Y.-H., Chen, H.-C.: Applying digital escape rooms infused with science teaching in elementary school: learning performance, learning motivation, and problem-solving ability. Think. Skills Creat. 37, 100681 (2020). https:\/\/doi.org\/10.1016\/j.tsc.2020.100681","journal-title":"Think. Skills Creat."},{"issue":"3","key":"1037_CR60","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1111\/eje.12521","volume":"24","author":"D Aubeux","year":"2020","unstructured":"Aubeux, D., Blanchflower, N., Bray, E., Clouet, R., Remaud, M., Badran, Z., Prud\u2019homme, T., Gaudin, A.: Educational gaming for dental students: design and assessment of a pilot endodontic-themed escape game. Eur. J. Dent. Educ. 24(3), 449\u2013457 (2020). https:\/\/doi.org\/10.1111\/eje.12521","journal-title":"Eur. J. Dent. Educ."},{"issue":"7","key":"1037_CR61","doi-asserted-by":"publisher","first-page":"6265","DOI":"10.5688\/ajpe8176265","volume":"81","author":"HN Eukel","year":"2017","unstructured":"Eukel, H.N., Frenzel, J.E., Cernusca, D.: Educational gaming for pharmacy students\u2013design and evaluation of a diabetes-themed escape room. Am. J. Pharm. Educ. 81(7), 6265 (2017). https:\/\/doi.org\/10.5688\/ajpe8176265","journal-title":"Am. J. Pharm. Educ."},{"issue":"5","key":"1037_CR62","doi-asserted-by":"publisher","first-page":"955","DOI":"10.1021\/acs.jchemed.8b00406","volume":"96","author":"R Peleg","year":"2019","unstructured":"Peleg, R., Yayon, M., Katchevich, D., Moria-Shipony, M., Blonder, R.: A lab-based chemical escape room: educational, mobile, and fun! J. Chem. Educ. 96(5), 955\u2013960 (2019)","journal-title":"J. Chem. Educ."},{"issue":"2","key":"1037_CR63","doi-asserted-by":"publisher","first-page":"2","DOI":"10.3390\/math8020166","volume":"8","author":"A Queiruga-Dios","year":"2020","unstructured":"Queiruga-Dios, A., Santos S\u00e1nchez, M.J., Queiruga Dios, M., Gayoso Mart\u00ednez, V., Hern\u00e1ndez Encinas, A.: A virus infected your laptop. let\u2019s play an escape game. Mathematics 8(2), 2 (2020). https:\/\/doi.org\/10.3390\/math8020166","journal-title":"Mathematics"},{"key":"1037_CR64","doi-asserted-by":"publisher","DOI":"10.1021\/acs.jchemed.0c00449","author":"MJ Vergne","year":"2020","unstructured":"Vergne, M.J., Smith, J.D., Bowen, R.S.: Escape the (Remote) classroom: an online escape room for remote learning. J. Chem. Educ. (2020). https:\/\/doi.org\/10.1021\/acs.jchemed.0c00449","journal-title":"J. Chem. Educ."},{"issue":"5","key":"1037_CR65","doi-asserted-by":"publisher","first-page":"961","DOI":"10.1021\/acs.jchemed.8b00831","volume":"96","author":"D Watermeier","year":"2019","unstructured":"Watermeier, D., Salzameda, B.: Escaping boredom in first semester general chemistry. J. Chem. Educ. 96(5), 961\u2013964 (2019). https:\/\/doi.org\/10.1021\/acs.jchemed.8b00831","journal-title":"J. Chem. Educ."},{"issue":"2","key":"1037_CR66","doi-asserted-by":"publisher","first-page":"83","DOI":"10.51698\/aloma.2019.37.2.83-92","volume":"37","author":"AS Urbieta","year":"2019","unstructured":"Urbieta, A.S., Pe\u00f1alver, E.A.: Escaping from the English classroom. who will get out first? Aloma: revista de psicologia, ci\u00e8ncies de l\u2019educaci\u00f3 i de l\u2019esport Blanquerna 37(2), 83\u201392 (2019). https:\/\/doi.org\/10.51698\/aloma.2019.37.2.83-92","journal-title":"Aloma: revista de psicologia, ci\u00e8ncies de l\u2019educaci\u00f3 i de l\u2019esport Blanquerna"},{"key":"1037_CR67","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/978-3-319-92252-2_6","volume-title":"Lecture Notes in Computer Science","author":"J-P Ma","year":"2018","unstructured":"Ma, J.-P., Chuang, M.-H., Lin, R.: An innovated design of escape room game box through integrating STEAM education and PBL principle. Cross-cultural design. Applications in cultural heritage, creativity and social development. In: Rau, P. (ed.) Lecture Notes in Computer Science, pp. 70\u201379. Springer International Publishing, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-92252-2_6"},{"issue":"1","key":"1037_CR68","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1080\/17404622.2019.1593475","volume":"34","author":"C Craig","year":"2020","unstructured":"Craig, C., Ngondo, P.S., Devlin, M., Scharlach, J.: Escaping the routine: unlocking group intervention. Commun. Teach. 34(1), 14\u201318 (2020). https:\/\/doi.org\/10.1080\/17404622.2019.1593475","journal-title":"Commun. Teach."},{"issue":"4","key":"1037_CR69","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1086\/693489","volume":"87","author":"R Pun","year":"2017","unstructured":"Pun, R.: Hacking the research library: wikipedia, trump, and information literacy in the escape room at Fresno State. Libr. Q. 87(4), 330\u2013336 (2017). https:\/\/doi.org\/10.1086\/693489","journal-title":"Libr. Q."},{"key":"1037_CR70","doi-asserted-by":"publisher","unstructured":"Oroszi E.D.: Security awareness escape room\u2014a possible new method in improving security awareness of users. In: 2019 international conference on cyber situational awareness, data analytics and assessment (Cyber SA), Jun. 2019, pp. 1\u20134. https:\/\/doi.org\/10.1109\/CyberSA.2019.8899715.","DOI":"10.1109\/CyberSA.2019.8899715"},{"key":"1037_CR71","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-030-50244-7_3","volume-title":"Innovations in Cybersecurity Education","author":"S Mello-Stark","year":"2020","unstructured":"Mello-Stark, S., VanValkenburg, M.A., Hao, E.: Thinking outside the box: using escape room games to increase interest in cyber security. In: Francia, G., Daimi, K. (eds.) Innovations in Cybersecurity Education, pp. 39\u201353. Springer International Publishing, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-50244-7_3"},{"key":"1037_CR72","unstructured":"Schneider B. and Zanwar T.: CySecEscape\u2013escape room technique to raise cybersecurity awareness in SMEs. In:\u00a0The Future of Education International Conference, p. 5, (2020)"},{"key":"1037_CR73","unstructured":"Emeraude-Escape: Customer Digital Games for Cybersecurity Awareness Training, Emeraude. Available on:https:\/\/emeraude-escape.com\/en\/solution\/cybersecurity\/"},{"key":"1037_CR74","unstructured":"Xcapism Learning | Cyber Security Escape Room. Xcapism Learning. Available on: https:\/\/www.xcapismlearning.com"},{"key":"1037_CR75","unstructured":"Cyber Security Escape Room Online. Available on: https:\/\/cybersecurity-escaperoom.com\/"},{"key":"1037_CR76","doi-asserted-by":"publisher","unstructured":"Hargittai E. and Micheli M: Internet skills and why they matter. Society and the Internet: How Networks of Information and Communication are Changing Our Lives, vol. 109, no. 2, pp. 109\u2013124, (2019). https:\/\/doi.org\/10.1093\/oso\/9780198843498.003.0007","DOI":"10.1093\/oso\/9780198843498.003.0007"},{"issue":"8","key":"1037_CR77","doi-asserted-by":"publisher","first-page":"1261","DOI":"10.1080\/1369118X.2016.1229001","volume":"20","author":"M B\u00fcchi","year":"2017","unstructured":"B\u00fcchi, M., Just, N., Latzer, M.: Caring is not enough: the importance of Internet skills for online privacy protection. Inf. Commun. Soc. 20(8), 1261\u20131278 (2017). https:\/\/doi.org\/10.1080\/1369118X.2016.1229001","journal-title":"Inf. Commun. Soc."},{"issue":"5","key":"1037_CR78","doi-asserted-by":"publisher","first-page":"712","DOI":"10.1080\/1369118X.2018.1428652","volume":"21","author":"M Dodel","year":"2018","unstructured":"Dodel, M., Mesch, G.: Inequality in digital skills and the adoption of online safety behaviors. Inf. Commun. Soc. 21(5), 712\u2013728 (2018). https:\/\/doi.org\/10.1080\/1369118X.2018.1428652","journal-title":"Inf. Commun. Soc."},{"issue":"5","key":"1037_CR79","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1177\/0267323117718464","volume":"32","author":"JL Mart\u00ednez-Cantos","year":"2017","unstructured":"Mart\u00ednez-Cantos, J.L.: Digital skills gaps: a pending subject for gender digital inclusion in the European Union. Eur. J. Commun. 32(5), 419\u2013438 (2017). https:\/\/doi.org\/10.1177\/0267323117718464","journal-title":"Eur. J. Commun."},{"key":"1037_CR80","doi-asserted-by":"crossref","unstructured":"Redmiles E.M., Kross S., and Mazurek M.L.: How i learned to be secure: a census-representative survey of security advice sources and behavior. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna Austria: ACM, Oct. 2016, pp. 666\u2013677. http:\/\/csc.gov.ky\/wp-content\/uploads\/2023\/06\/Essential-digital-skills-framework-EXCERPT.pdf.","DOI":"10.1145\/2976749.2978307"},{"key":"1037_CR81","doi-asserted-by":"publisher","unstructured":"The UK Government. Essential digital skills framework. (2019). Accessed 06 Oct. 2024. [Online]. Available: https:\/\/doi.org\/10.1145\/2976749.2978307","DOI":"10.1145\/2976749.2978307"},{"key":"1037_CR82","unstructured":"Sonck N., Livingstone S., Kuiper E., and J. Haan J.: Digital literacy and safety skills. EU Kids Online, The London School of Economics and Political Science, London, UK. Jan. (2011)"},{"issue":"3","key":"1037_CR83","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1057\/ejis.2012.23","volume":"22","author":"T Dinev","year":"2013","unstructured":"Dinev, T., Xu, H., Smith, J.H., Hart, P.: Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts. Eur. J. Inf. Syst. 22(3), 295\u2013316 (2013). https:\/\/doi.org\/10.1057\/ejis.2012.23","journal-title":"Eur. J. Inf. Syst."},{"key":"1037_CR84","doi-asserted-by":"publisher","first-page":"1","DOI":"10.7312\/gold91730-002","volume-title":"Killing the Messenger","author":"S Warren","year":"1989","unstructured":"Warren, S., Brandeis, L.: The Right to Privacy. In: Goldstein, T. (ed.) Killing the Messenger, pp. 1\u201321. Columbia University Press, Columbia (1989). https:\/\/doi.org\/10.7312\/gold91730-002"},{"key":"1037_CR85","doi-asserted-by":"publisher","unstructured":"Dhillon G.S. and Moores T.T.: Internet privacy: interpreting key issues. In Ethical Issues of Information Systems, IGI Global, pp. 1\u20139 (2002). Accessed 29 Aug. 2024. https:\/\/doi.org\/10.4018\/978-1-931777-15-5.ch001","DOI":"10.4018\/978-1-931777-15-5.ch001"},{"issue":"9","key":"1037_CR86","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1145\/903893.903897","volume":"46","author":"R Di Pietro","year":"2003","unstructured":"Di Pietro, R., Mancini, L.V.: Security and privacy issues of handheld and wearable wireless devices. Commun. ACM 46(9), 74\u201379 (2003). https:\/\/doi.org\/10.1145\/903893.903897","journal-title":"Commun. ACM"},{"key":"1037_CR87","doi-asserted-by":"publisher","unstructured":"Schoeman F.D.: Philosophical dimensions of privacy: An Anthology. Cambridge University Press, (1984). Accessed 29 Aug 2024, https:\/\/doi.org\/10.1017\/CBO9780511625138","DOI":"10.1017\/CBO9780511625138"},{"issue":"8","key":"1037_CR88","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1016\/j.im.2018.05.006","volume":"55","author":"Z Liu","year":"2018","unstructured":"Liu, Z., Wang, X.: How to regulate individuals\u2019 privacy boundaries on social network sites: a cross-cultural comparison. Inf. Manag. 55(8), 1005\u20131023 (2018). https:\/\/doi.org\/10.1016\/j.im.2018.05.006","journal-title":"Inf. Manag."},{"key":"1037_CR89","unstructured":"Mekovec R.0020and Hutinski \u017d.: The role of perceived privacy and perceived security in online market. In: 2012 Proceedings of the 35th International Convention MIPRO, May 2012, pp. 1549\u20131554. Accessed: Aug. 13, 2024. [Online]. Available: https:\/\/ieeexplore.ieee.org\/abstract\/document\/6240857"},{"issue":"12","key":"1037_CR90","doi-asserted-by":"publisher","first-page":"798","DOI":"10.17705\/1jais.00281","volume":"12","author":"H Xu","year":"2011","unstructured":"Xu, H., et al.: Information privacy concerns: linking individual perceptions with institutional privacy assurances. J. Assoc. Inf. Syst. 12(12), 798\u2013824 (2011). https:\/\/doi.org\/10.17705\/1jais.00281","journal-title":"J. Assoc. Inf. Syst."},{"key":"1037_CR91","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1287\/isre.1040.0032","volume":"15","author":"N Malhotra","year":"2004","unstructured":"Malhotra, N., Kim, S., Agarwal, J.: Internet users\u2019 information privacy concerns (IUIPC): the construct, the scale, and a causal model. Inf. Syst. Res. 15, 336\u2013355 (2004). https:\/\/doi.org\/10.1287\/isre.1040.0032","journal-title":"Inf. Syst. Res."},{"issue":"4","key":"1037_CR92","doi-asserted-by":"publisher","first-page":"2333","DOI":"10.1007\/s12525-022-00522-6","volume":"32","author":"N Koester","year":"2022","unstructured":"Koester, N., Cichy, P., Antons, D., Salge, T.O.: Perceived privacy risk in the Internet of Things: determinants, consequences, and contingencies in the case of connected cars. Electron Markets 32(4), 2333\u20132355 (2022). https:\/\/doi.org\/10.1007\/s12525-022-00522-6","journal-title":"Electron Markets"},{"issue":"3","key":"1037_CR93","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/S0963-8687(02)00017-3","volume":"11","author":"PA Pavlou","year":"2002","unstructured":"Pavlou, P.A.: Institution-based trust in interorganizational exchange relationships: the role of online B2B marketplaces on trust formation. J. Strateg. Inf. Syst. 11(3), 215\u2013243 (2002). https:\/\/doi.org\/10.1016\/S0963-8687(02)00017-3","journal-title":"J. Strateg. Inf. Syst."},{"issue":"2","key":"1037_CR94","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1108\/ICS-01-2020-0003","volume":"29","author":"T Papaioannou","year":"2021","unstructured":"Papaioannou, T., Tsohou, A., Karyda, M.: Forming digital identities in social networks: the role of privacy concerns and self-esteem. Inf. Comput. Security 29(2), 240\u2013262 (2021). https:\/\/doi.org\/10.1108\/ICS-01-2020-0003","journal-title":"Inf. Comput. Security"},{"issue":"1","key":"1037_CR95","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1287\/orsc.10.1.104","volume":"10","author":"MJ Culnan","year":"1999","unstructured":"Culnan, M.J., Armstrong, P.K.: Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation. Organ. Sci. 10(1), 104\u2013115 (1999). https:\/\/doi.org\/10.1287\/orsc.10.1.104","journal-title":"Organ. Sci."},{"key":"1037_CR96","first-page":"289","volume-title":"Perceived control: scales for privacy in ubiquitous computing","author":"S Spiekermann","year":"2007","unstructured":"Spiekermann, S.: Perceived control: scales for privacy in ubiquitous computing, pp. 289\u2013304. Digital Privacy, Auerbach Publications (2007)"},{"issue":"1","key":"1037_CR97","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.elerap.2009.05.001","volume":"9","author":"CM Hoadley","year":"2010","unstructured":"Hoadley, C.M., Xu, H., Lee, J.J., Rosson, M.B.: Privacy as information access and illusory control: the case of the Facebook news feed privacy outcry. Electron. Commer. Res. Appl. 9(1), 50\u201360 (2010). https:\/\/doi.org\/10.1016\/j.elerap.2009.05.001","journal-title":"Electron. Commer. Res. Appl."},{"issue":"1","key":"1037_CR98","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/s12394-009-0019-1","volume":"2","author":"H Krasnova","year":"2009","unstructured":"Krasnova, H., G\u00fcnther, O., Spiekermann, S., Koroleva, K.: Privacy concerns and identity in online social networks. Identity Inf. Soc. 2(1), 39\u201363 (2009). https:\/\/doi.org\/10.1007\/s12394-009-0019-1","journal-title":"Identity Inf. Soc."},{"key":"1037_CR99","unstructured":"Madden M.: Privacy management on social media sites. Pew Internet & American Life Project, p. 20. (2012)"},{"issue":"10","key":"1037_CR100","doi-asserted-by":"publisher","first-page":"1431","DOI":"10.1177\/0002764218787019","volume":"62","author":"X Li","year":"2018","unstructured":"Li, X.: Understanding eHealth literacy from a privacy perspective: eHealth literacy and digital privacy skills in American disadvantaged communities. Am. Behav. Sci. 62(10), 1431\u20131449 (2018). https:\/\/doi.org\/10.1177\/0002764218787019","journal-title":"Am. Behav. Sci."},{"issue":"1","key":"1037_CR101","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1080\/15536548.2012.11082759","volume":"8","author":"O Pitk\u00e4nen","year":"2012","unstructured":"Pitk\u00e4nen, O., Tuunainen, V.K.: Disclosing personal data socially\u2014an empirical study on facebook users\u2019 privacy awareness. J. Inf. Privacy Secur. 8(1), 3\u201329 (2012). https:\/\/doi.org\/10.1080\/15536548.2012.11082759","journal-title":"J. Inf. Privacy Secur."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01037-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01037-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01037-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T06:12:11Z","timestamp":1750486331000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01037-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,29]]},"references-count":101,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["1037"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01037-9","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-5277322\/v1","asserted-by":"object"}]},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,29]]},"assertion":[{"value":"8 April 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 April 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there are no known conflicts of interest that could have influenced the research reported in this manuscript. They certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript. Furthermore, they did not receive support from any organization for the submitted work.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interests"}}],"article-number":"120"}}