{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T09:51:41Z","timestamp":1764841901517,"version":"3.37.3"},"reference-count":50,"publisher":"Informa UK Limited","issue":"3","funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1220026"],"award-info":[{"award-number":["1220026"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Human\u2013Computer Interaction"],"published-print":{"date-parts":[[2017,3,4]]},"DOI":"10.1080\/10447318.2016.1232909","type":"journal-article","created":{"date-parts":[[2016,9,20]],"date-time":"2016-09-20T13:16:44Z","timestamp":1474377404000},"page":"215-228","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":7,"title":["Expert Sources in Warnings May Reduce the Extent of Identity Disclosure in Cyber Contexts"],"prefix":"10.1080","volume":"33","author":[{"given":"Sandra","family":"Carpenter","sequence":"first","affiliation":[{"name":"Department of Psychology, The University of Alabama, Huntsville, Alabama, USA"}]},{"given":"Feng","family":"Zhu","sequence":"additional","affiliation":[{"name":"Department of Computer Science, The University of Alabama, Huntsville, Alabama, USA"}]},{"given":"Mini","family":"Zeng","sequence":"additional","affiliation":[{"name":"Department of Computer Science, The University of Alabama, Huntsville, Alabama, USA"}]},{"given":"Michael","family":"Shreeves","sequence":"additional","affiliation":[{"name":"Department of Psychology, Clemson University, Clemson, South Carolina, USA"}]}],"member":"301","published-online":{"date-parts":[[2016,9,20]]},"reference":[{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2011.572331"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1086\/209102"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-8141(01)00015-4"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.2307\/2786324"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.198"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1016\/j.apergo.2013.10.005"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.66.3.460"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.05.005"},{"key":"CIT0012","volume-title":"Influence","volume":"3","author":"Cialdini R. B.","year":"1993"},{"key":"CIT0013","first-page":"72","volume":"79","author":"Cialdini R. B.","year":"2001","journal-title":"Harvard Business Review"},{"volume-title":"Advances in ergonomics","year":"2002","author":"Costello A. J.","key":"CIT0014"},{"key":"CIT0015","first-page":"1","volume":"8","author":"Cranor L. F.","year":"2008","journal-title":"UPSEC"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.19.1.20.16944"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1016\/S1071-5819(03)00111-3"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.38.6.889"},{"volume-title":"Studies in social power","year":"1959","author":"French J.","key":"CIT0022"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2008.6"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1016\/S0305-0483(00)00021-9"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1145\/569905.569910"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1016\/j.omega.2004.01.006"},{"volume-title":"Y. Amichai-Hamburger (Ed.), The social net: The social science of the internet","year":"2005","author":"Guadagno R.","key":"CIT0028"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1145\/1125864.1125887"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1086\/266350"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2014.925384"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2013.839904"},{"key":"CIT0036","first-page":"333","author":"La Porta R.","year":"1997","journal-title":"AEA Papers and Proceedings"},{"volume-title":"Mindfulness: Choice and control in everyday life","year":"1991","author":"Langer E. J.","key":"CIT0037"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1016\/1053-8100(92)90066-J"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1518\/hfes.46.1.50.30392"},{"volume-title":"Warning Volume 1: Fundamentals, design, and evaluation methodologies","year":"1986","author":"Lehto M.","key":"CIT0041"},{"key":"CIT0042","first-page":"149","volume":"25","author":"Lipkus I. M.","year":"1998","journal-title":"Journal of the National Cancer Institute. Monographs"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.2466\/pr0.1986.58.3.707"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.2307\/3150690"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.2307\/3172593"},{"volume-title":"Primer on decision making: How decisions happen","year":"1994","author":"March J. G.","key":"CIT0046"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.5465\/AMR.1995.9508080335"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.1287\/isre.13.3.334.81"},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.01.001"},{"key":"CIT0054","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.1993.tb01191.x"},{"key":"CIT0055","doi-asserted-by":"publisher","DOI":"10.1037\/h0031464"},{"key":"CIT0056","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.2005.24.2.273"},{"key":"CIT0057","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2011.654198"},{"key":"CIT0058","doi-asserted-by":"publisher","DOI":"10.1111\/0272-4332.205064"},{"key":"CIT0059","doi-asserted-by":"publisher","DOI":"10.1126\/science.3563507"},{"key":"CIT0061","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"CIT0063","doi-asserted-by":"crossref","DOI":"10.1201\/9781482289688","volume-title":"Handbook of warnings","author":"Wogalter M. S.","year":"2006"},{"key":"CIT0064","doi-asserted-by":"crossref","DOI":"10.1201\/9781482289688","volume-title":"Handbook of warnings","author":"Wogalter M. S.","year":"2006"},{"key":"CIT0065","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-8141(98)00025-0"},{"key":"CIT0066","doi-asserted-by":"publisher","DOI":"10.4018\/jthi.2008010105"},{"key":"CIT0069","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2011.06.007"}],"container-title":["International Journal of Human\u2013Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10447318.2016.1232909","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T16:18:27Z","timestamp":1568391507000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10447318.2016.1232909"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,20]]},"references-count":50,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2016,8,26]]},"published-print":{"date-parts":[[2017,3,4]]}},"alternative-id":["10.1080\/10447318.2016.1232909"],"URL":"https:\/\/doi.org\/10.1080\/10447318.2016.1232909","relation":{},"ISSN":["1044-7318","1532-7590"],"issn-type":[{"type":"print","value":"1044-7318"},{"type":"electronic","value":"1532-7590"}],"subject":[],"published":{"date-parts":[[2016,9,20]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}