{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T15:11:18Z","timestamp":1761664278460,"version":"3.40.5"},"reference-count":156,"publisher":"Informa UK Limited","issue":"5","license":[{"start":{"date-parts":[[2021,8,5]],"date-time":"2021-08-05T00:00:00Z","timestamp":1628121600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Human\u2013Computer Interaction"],"published-print":{"date-parts":[[2022,3,16]]},"DOI":"10.1080\/10447318.2021.1949134","type":"journal-article","created":{"date-parts":[[2021,8,5]],"date-time":"2021-08-05T10:43:13Z","timestamp":1628160193000},"page":"468-490","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":17,"title":["Prototyping Usable Privacy and Security Systems: Insights from Experts"],"prefix":"10.1080","volume":"38","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1690-3410","authenticated-orcid":false,"given":"Florian","family":"Mathis","sequence":"first","affiliation":[{"name":"School of Computing Science, University of Glasgow, Scotland, UK"},{"name":"The School of Informatics, University of Edinburgh, Scotland, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8042-3342","authenticated-orcid":false,"given":"Kami","family":"Vaniea","sequence":"additional","affiliation":[{"name":"The School of Informatics, University of Edinburgh, Scotland, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7051-5200","authenticated-orcid":false,"given":"Mohamed","family":"Khamis","sequence":"additional","affiliation":[{"name":"School of Computing Science, University of Glasgow, Scotland, UK"}]}],"member":"301","published-online":{"date-parts":[[2021,8,5]]},"reference":[{"key":"cit0001","doi-asserted-by":"publisher","DOI":"10.1145\/3314111.3319837"},{"key":"cit0002","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev.2016.013"},{"key":"cit0003","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"cit0004","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.37"},{"issue":"3","key":"cit0005","first-page":"189","volume":"18","author":"Alt F.","year":"2019","journal-title":"Journal of Interactive Media"},{"volume-title":"Symposium on digital behaviour intervention for cyber security","year":"2018","author":"Althobaiti K.","key":"cit0006"},{"volume-title":"Chi 2003","year":"2003","author":"Andrew P.","key":"cit0007"},{"key":"cit0008","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274702"},{"key":"cit0009","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501616"},{"key":"cit0010","doi-asserted-by":"publisher","DOI":"10.1145\/1166253.1166261"},{"key":"cit0011","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22950-3_9"},{"key":"cit0012","doi-asserted-by":"publisher","DOI":"10.1515\/itit-2016-0010"},{"key":"cit0013","doi-asserted-by":"publisher","DOI":"10.1145\/1935701.1935740"},{"key":"cit0014","doi-asserted-by":"publisher","DOI":"10.1145\/2071536.2071542"},{"key":"cit0015","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102023"},{"key":"cit0016","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2011.185"},{"key":"cit0017","doi-asserted-by":"publisher","DOI":"10.1145\/2611009.2611028"},{"key":"cit0018","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2011.85"},{"key":"cit0019","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858498"},{"key":"cit0020","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11851-2_14"},{"key":"cit0021","first-page":"1","volume-title":"Proceedings of the 2020 chi conference on human factors in computing systems","author":"Chen Y.","year":"2020"},{"key":"cit0022","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00034"},{"key":"cit0023","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2016.7760964"},{"key":"cit0024","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173715"},{"volume-title":"Basics of qualitative research: Techniques and procedures for developing grounded theory","year":"2014","author":"Corbin J.","key":"cit0025"},{"volume-title":"Security and usability: Designing secure systems that people can use","year":"2005","author":"Cranor L. F.","key":"cit0026"},{"volume-title":"2020 USENIX conference on privacy engineering practice and respect (PEPR 20)","year":"2020","author":"Cranor L. F.","key":"cit0027"},{"key":"cit0028","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025991"},{"key":"cit0029","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2002.993142"},{"key":"cit0030","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572542"},{"key":"cit0031","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557097"},{"key":"cit0032","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837131"},{"key":"cit0033","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481330"},{"key":"cit0034","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481331"},{"volume-title":"Human-computer interaction","year":"2003","author":"Dix A.","key":"cit0035"},{"key":"cit0036","doi-asserted-by":"publisher","DOI":"10.1177\/0956797613512465"},{"key":"cit0037","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501617"},{"key":"cit0038","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642652"},{"key":"cit0039","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557292"},{"volume-title":"How to design and report experiments","year":"2002","author":"Field A.","key":"cit0040"},{"volume-title":"Security and usability: Searching for the philosopher\u2019s stone","year":"2010","author":"Fl\u00e9chais I.","key":"cit0041"},{"key":"cit0042","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134047"},{"key":"cit0043","doi-asserted-by":"publisher","DOI":"10.2200\/S00594ED1V01Y201408SPT011"},{"key":"cit0044","doi-asserted-by":"publisher","DOI":"10.1109\/VR.2019.8797862"},{"key":"cit0045","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2017.23028"},{"key":"cit0046","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010512628145"},{"key":"cit0047","doi-asserted-by":"publisher","DOI":"10.1109\/49.223865"},{"key":"cit0048","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357074"},{"key":"cit0049","doi-asserted-by":"publisher","DOI":"10.1145\/502348.502388"},{"key":"cit0050","doi-asserted-by":"publisher","DOI":"10.1177\/1525822X05279903"},{"key":"cit0051","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858267"},{"key":"cit0052","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858273"},{"key":"cit0053","first-page":"213","volume-title":"Proceedings of the tenth usenix conference on usable privacy and security","author":"Harbach M.","year":"2014"},{"key":"cit0054","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335359"},{"key":"cit0055","doi-asserted-by":"publisher","DOI":"10.1145\/2578903.2579162"},{"key":"cit0056","doi-asserted-by":"publisher","DOI":"10.1016\/B978-044481862-1.50082-0"},{"key":"cit0057","doi-asserted-by":"publisher","DOI":"10.1145\/3098279.3098550"},{"key":"cit0058","doi-asserted-by":"publisher","DOI":"10.1561\/1100000004"},{"key":"cit0059","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2005.19"},{"key":"cit0060","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753384"},{"volume-title":"Open science, open to the world\u2013a vision for europe","year":"2016","author":"Innovation O.","key":"cit0061"},{"volume-title":"Conference on human factors in computing systems - Proceedings","year":"1998","author":"Ishii H.","key":"cit0062"},{"key":"cit0063","first-page":"1","volume-title":"Proceedings of the 8th conference on usenix security symposium - volume 8","author":"Jermyn I.","year":"1999"},{"key":"cit0064","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(03)00006-3"},{"key":"cit0065","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2010.77"},{"volume-title":"The original kj method","year":"1991","author":"Kawakita J.","key":"cit0066"},{"key":"cit0067","doi-asserted-by":"publisher","DOI":"10.1145\/3027063.3027084"},{"key":"cit0068","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892314"},{"key":"cit0069","doi-asserted-by":"publisher","DOI":"10.1145\/3136755.3136809"},{"key":"cit0070","doi-asserted-by":"publisher","DOI":"10.1145\/3287052"},{"key":"cit0071","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pbio.1002456"},{"key":"cit0072","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753489"},{"key":"cit0073","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.179"},{"key":"cit0074","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28637-0_6"},{"key":"cit0075","first-page":"43","volume-title":"Proceedings of the 16th international conference on human-computer interaction with mobile devices &; services","author":"Kjeldskov J.","year":"2014"},{"key":"cit0076","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2014.09.005"},{"key":"cit0077","first-page":"207","volume-title":"Twelfth symposium on us- able privacy and security (SOUPS 2016)","author":"Krombholz K.","year":"2016"},{"key":"cit0078","doi-asserted-by":"publisher","DOI":"10.1145\/3274371"},{"volume-title":"Research methods in human-computer inter- action","year":"2017","author":"Lazar J.","key":"cit0079"},{"key":"cit0080","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501611"},{"issue":"1","key":"cit0081","first-page":"1","volume":"2","author":"Liu R.","year":"2018","journal-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"},{"key":"cit0082","doi-asserted-by":"publisher","DOI":"10.1108\/13639510210450677"},{"key":"cit0083","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025600"},{"key":"cit0084","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174020"},{"volume-title":"Proceedings of the 38th annual acm conference on human factors in computing systems","year":"2020","author":"M\u00e4kel\u00e4 V.","key":"cit0085"},{"key":"cit0086","doi-asserted-by":"publisher","DOI":"10.1145\/3036699.3036712"},{"key":"cit0087","first-page":"189","volume-title":"Twelfth symposium on usable privacy and security (SOUPS 2016)","author":"Mare S.","year":"2016"},{"key":"cit0088","first-page":"1525","volume-title":"Ieee symposium on security and privacy","author":"Markert P.","year":"2020"},{"key":"cit0089","first-page":"1","volume-title":"Proceedings of the 2020 chi conference on human factors in computing systems","author":"Marky K.","year":"2020"},{"key":"cit0090","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445478"},{"key":"cit0091","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3382827"},{"issue":"28","key":"cit0092","volume":"1","author":"Mathis F.","year":"2021","journal-title":"ACM Transactions on Computer-Human Interaction (Tochi)"},{"key":"cit0093","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078830"},{"key":"cit0094","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516726"},{"key":"cit0095","doi-asserted-by":"publisher","DOI":"10.1080\/07294360500453053"},{"key":"cit0096","doi-asserted-by":"publisher","DOI":"10.1126\/science.1250475"},{"key":"cit0097","doi-asserted-by":"publisher","DOI":"10.1145\/3282894.3282923"},{"key":"cit0098","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20416"},{"key":"cit0099","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0026"},{"key":"cit0100","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00012"},{"key":"cit0101","doi-asserted-by":"publisher","DOI":"10.3200\/GENP.135.2.151-166"},{"volume-title":"Usability engineering","year":"1994","author":"Nielsen J.","key":"cit0102"},{"volume-title":"Ten usability heuristics","year":"2005","author":"Nielsen J.","key":"cit0103"},{"volume-title":"The psychology of everyday things","year":"1988","author":"Norman D. A.","key":"cit0104"},{"key":"cit0105","doi-asserted-by":"publisher","DOI":"10.1126\/science.aab2374"},{"key":"cit0106","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2018.1541544"},{"key":"cit0107","doi-asserted-by":"publisher","DOI":"10.1037\/h0043424"},{"key":"cit0108","doi-asserted-by":"publisher","DOI":"10.3390\/electronics7120379"},{"key":"cit0109","doi-asserted-by":"publisher","DOI":"10.1145\/3399715.3399823"},{"key":"cit0110","doi-asserted-by":"publisher","DOI":"10.1145\/3338286.3340129"},{"key":"cit0111","doi-asserted-by":"publisher","DOI":"10.1515\/icom-2016-0021"},{"key":"cit0112","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00059"},{"key":"cit0113","unstructured":"Redmiles, E. M., Acar, Y., Fahl, S. & Mazurek, M. L. (2017). A summary of survey methodology best practices for security and privacy researchers (Tech. Rep.)."},{"key":"cit0114","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243740"},{"key":"cit0115","doi-asserted-by":"publisher","DOI":"10.1145\/2607023.2607039"},{"key":"cit0116","doi-asserted-by":"publisher","DOI":"10.1080\/00224545.1995.9713958"},{"key":"cit0117","doi-asserted-by":"publisher","DOI":"10.1007\/s11573-018-0916-6"},{"volume-title":"The coding manual for qualitative researchers","year":"2015","author":"Salda\u00f1a J.","key":"cit0118"},{"key":"cit0119","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"cit0120","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011902718709"},{"key":"cit0121","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.110"},{"key":"cit0122","doi-asserted-by":"publisher","DOI":"10.1177\/1468794114550439"},{"key":"cit0123","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2632087"},{"issue":"2","key":"cit0124","first-page":"38","volume":"44","author":"Schofield T.","year":"2013","journal-title":"Journal of Research Administration"},{"key":"cit0125","doi-asserted-by":"publisher","DOI":"10.1080\/00909880500149445"},{"key":"cit0126","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780198758839.001.0001"},{"volume-title":"Designing the user interface: Strategies for effective human-computer interaction","year":"2010","author":"Shneiderman B.","key":"cit0127"},{"key":"cit0128","volume-title":"Designing the user interface: Strategies for effective human-computer interaction","author":"Shneiderman B.","year":"2016","edition":"6"},{"key":"cit0129","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078831"},{"key":"cit0130","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2019.1619259"},{"key":"cit0131","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23351"},{"key":"cit0132","first-page":"399","volume-title":"Usenix security symposium","author":"Sunshine J.","year":"2009"},{"key":"cit0133","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2011.16"},{"issue":"2","key":"cit0134","first-page":"273","volume":"7","author":"Tao H.","year":"2008","journal-title":"International Journal of Network Security"},{"key":"cit0135","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143128"},{"key":"cit0136","unstructured":"Tkacik, D. (2020, December 17). Cylab researchers design privacy icon to be used by california law. https:\/\/www.cylab.cmu.edu\/\/news\/2020\/12\/11-donotsell.html"},{"key":"cit0137","doi-asserted-by":"publisher","DOI":"10.1007\/s11257-011-9110-z"},{"key":"cit0138","doi-asserted-by":"publisher","DOI":"10.1145\/3285002.3285010"},{"issue":"2","key":"cit0139","first-page":"3084","volume":"3","author":"Turner C. W.","year":"2006","journal-title":"International Encyclopedia of Ergonomics and Human Factors"},{"key":"cit0140","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3026050"},{"key":"cit0141","doi-asserted-by":"publisher","DOI":"10.1023\/B:JAET.0000006919.58804.4c"},{"key":"cit0142","doi-asserted-by":"publisher","DOI":"10.1016\/j.cub.2013.11.014"},{"key":"cit0143","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300737"},{"key":"cit0144","first-page":"1","volume-title":"Fourteenth symposium on usable privacy and security (SOUPS 2018)","author":"Volkamer M.","year":"2018"},{"key":"cit0145","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702212"},{"key":"cit0146","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376448"},{"key":"cit0147","first-page":"14","volume-title":"Proceedings of the 8th conference on usenix security symposium - volume 8","author":"Whitten A.","year":"1999"},{"key":"cit0148","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.61.7.726"},{"key":"cit0149","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073002"},{"key":"cit0150","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2015.23007"},{"key":"cit0151","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702316"},{"key":"cit0152","doi-asserted-by":"publisher","DOI":"10.1145\/2907069"},{"key":"cit0153","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26633-6_5"},{"key":"cit0154","doi-asserted-by":"publisher","DOI":"10.4103\/0019-5049.190627"},{"key":"cit0155","first-page":"159","volume-title":"28th {USENIX} security symposium ({USENIX} security 19)","author":"Zeng E.","year":"2019"},{"key":"cit0156","doi-asserted-by":"publisher","DOI":"10.1145\/304851.304859"}],"container-title":["International Journal of Human\u2013Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10447318.2021.1949134","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T08:21:04Z","timestamp":1643617264000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10447318.2021.1949134"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,5]]},"references-count":156,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,3,16]]}},"alternative-id":["10.1080\/10447318.2021.1949134"],"URL":"https:\/\/doi.org\/10.1080\/10447318.2021.1949134","relation":{},"ISSN":["1044-7318","1532-7590"],"issn-type":[{"type":"print","value":"1044-7318"},{"type":"electronic","value":"1532-7590"}],"subject":[],"published":{"date-parts":[[2021,8,5]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2021-08-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}