{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T17:28:47Z","timestamp":1769880527964,"version":"3.49.0"},"reference-count":142,"publisher":"Informa UK Limited","issue":"20","funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-"],"award-info":[{"award-number":["CNS-"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["699"],"award-info":[{"award-number":["699"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-"],"award-info":[{"award-number":["CNS-"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["694"],"award-info":[{"award-number":["694"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Human\u2013Computer Interaction"],"published-print":{"date-parts":[[2025,10,18]]},"DOI":"10.1080\/10447318.2025.2464890","type":"journal-article","created":{"date-parts":[[2025,3,3]],"date-time":"2025-03-03T06:48:47Z","timestamp":1740984527000},"page":"12622-12648","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":1,"title":["This One Weird Trick Gets Users to Stop Clicking on Clickbait"],"prefix":"10.1080","volume":"41","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9012-6146","authenticated-orcid":false,"given":"Ankit","family":"Shrestha","sequence":"first","affiliation":[{"name":"Department of Computer Science, Utah State University","place":["Logan, USA"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8547-7868","authenticated-orcid":false,"given":"Arezou","family":"Behfar","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Utah State University","place":["Logan, USA"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4548-637X","authenticated-orcid":false,"given":"Sovantharith","family":"Seng","sequence":"additional","affiliation":[{"name":"Global Cybersecurity Institute, Rochester Institute of Technology","place":["Rochester, USA"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8489-6347","authenticated-orcid":false,"given":"Matthew","family":"Wright","sequence":"additional","affiliation":[{"name":"Global Cybersecurity Institute, Rochester Institute of Technology","place":["Rochester, USA"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5764-2253","authenticated-orcid":false,"given":"Mahdi Nasrullah","family":"Al-Ameen","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Utah State University","place":["Logan, USA"]}]}],"member":"301","published-online":{"date-parts":[[2025,3,3]]},"reference":[{"key":"e_1_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1037\/0278-6133.27.3.379"},{"key":"e_1_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1108\/OTH-08-2015-0044"},{"key":"e_1_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543846"},{"key":"e_1_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/NGCT.2016.7877426"},{"key":"e_1_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"e_1_3_3_7_1","volume-title":"Symposium on usable privacy and security (Poster Session","author":"Al-Ameen M. N.","year":"2020","unstructured":"Al-Ameen, M. N., & Kocabas, H. (2020). \u201cI cannot do anything\u201d: User\u2019s behavior and protection strategy upon losing, or identifying unauthorized access to online account. In Symposium on usable privacy and security (Poster Session)."},{"key":"e_1_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0067"},{"key":"e_1_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.2307\/1956437"},{"key":"e_1_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502040"},{"key":"e_1_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702210"},{"key":"e_1_3_3_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56608-5_46"},{"key":"e_1_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998294"},{"key":"e_1_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274289"},{"key":"e_1_3_3_15_1","doi-asserted-by":"crossref","unstructured":"Arun A. Chhatani S. An J. & Kumaraguru P. (2024). X-posing free speech: Examining the impact of moderation relaxation on online social networks. arXiv preprint arXiv:2404.11465.","DOI":"10.18653\/v1\/2024.woah-1.15"},{"key":"e_1_3_3_16_1","unstructured":"Atreja S. Hemphill L. & Resnick P. (2022). What is the will of the people? moderation preferences for misinformation. arXiv preprint arXiv:2202.00799."},{"key":"e_1_3_3_17_1","unstructured":"Babu A. Liu A. & Zhang J. (2017). New updates to reduce clickbait headlines. Facebook Newsroom."},{"key":"e_1_3_3_18_1","volume-title":"Understanding your users: A practical guide to user research methods","author":"Baxter K.","year":"2015","unstructured":"Baxter, K., Courage, C., & Caine, K. (2015). Understanding your users: A practical guide to user research methods (2nd ed.). Morgan Kaufmann Publishers Inc.","edition":"2"},{"key":"e_1_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479571"},{"key":"e_1_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3272973.3274056"},{"key":"e_1_3_3_21_1","unstructured":"Bickert M. (2019). Combatting vaccine misinformation. Facebook Newsroom 1."},{"key":"e_1_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph18158091"},{"key":"e_1_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcom.12166"},{"key":"e_1_3_3_24_1","volume-title":"Transforming qualitative information: Thematic analysis and code development","author":"Boyatzis R. E.","year":"1998","unstructured":"Boyatzis, R. E. (1998). Transforming qualitative information: Thematic analysis and code development. SAGE."},{"key":"e_1_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_3_26_1","unstructured":"Brinks M. (2019). Ethos pathos logos kairos: The modes of persuasion and how to use them. Prep Scholar Retrieved on August 20 2021."},{"key":"e_1_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.3390\/app13042456"},{"key":"e_1_3_3_28_1","doi-asserted-by":"crossref","unstructured":"Broscoteanu D.-M. & Ionescu R. T. (2023). A novel contrastive learning method for click-bait detection on roclico: A romanian clickbait corpus of news articles. arXiv preprint arXiv:2310.06540.","DOI":"10.18653\/v1\/2023.findings-emnlp.640"},{"key":"e_1_3_3_29_1","unstructured":"Brown C. & Levin J. (2020). Prioritizing original news reporting on facebook. Internet Archive."},{"key":"e_1_3_3_30_1","volume-title":"Drawn to see: Drawing as an ethnographic method","author":"Causey A.","year":"2017","unstructured":"Causey, A. (2017). Drawn to see: Drawing as an ethnographic method. University of Toronto Press."},{"key":"e_1_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2016.7752207"},{"key":"e_1_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2823465.2823467"},{"key":"e_1_3_3_33_1","volume-title":"Where we go from here: Health misinformation on social media","author":"Chou W.-Y. S.","year":"2020","unstructured":"Chou, W.-Y. S., Gaysynsky, A., & Cappella, J. N. (2020). Where we go from here: Health misinformation on social media (Vol. 110, No. S3). American Public Health Association."},{"key":"e_1_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0201-76"},{"key":"e_1_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11109-019-09533-0"},{"key":"e_1_3_3_36_1","unstructured":"Crowell C. (2017). Our approach to bots and misinformation. Twitter public policy."},{"key":"e_1_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.1002\/job.1962"},{"key":"e_1_3_3_38_1","unstructured":"Donato L. (2016 November). The dark side of clickbait \u2013 This will shock you. https:\/\/www.blumshapiro.com\/insights\/clickbait-cybersecurity-ransomware-ct-ma-ri\/"},{"key":"e_1_3_3_39_1","unstructured":"Driscoll D. L. & Brizee A. (2010). Creating good interview and survey questions. Purdue Online Writing Lab."},{"key":"e_1_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-35936-1_15"},{"key":"e_1_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-04-2023-0047"},{"key":"e_1_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.3758\/MC.38.8.1087"},{"key":"e_1_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445164"},{"key":"e_1_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702442"},{"key":"e_1_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.metip.2023.100120"},{"key":"e_1_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376784"},{"key":"e_1_3_3_47_1","unstructured":"Gleicher N. (2019). Removing coordinated inauthentic behavior from china. Facebook Newsroom 19."},{"key":"e_1_3_3_48_1","unstructured":"Goldman R. & Himel A. (2018). Making ads and pages more transparent. Retrieved May."},{"key":"e_1_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.acl-long.484"},{"key":"e_1_3_3_50_1","volume-title":"Universal methods of design expanded and revised: 125 ways to research complex problems, develop innovative ideas, and design eflective solutions","author":"Hanington B.","year":"2019","unstructured":"Hanington, B., & Martin, B. (2019). Universal methods of design expanded and revised: 125 ways to research complex problems, develop innovative ideas, and design eflective solutions. Rockport Publishers."},{"key":"e_1_3_3_51_1","unstructured":"Harvey D. (2019). Helping you find reliable public health information on twitter. Blog.Twitter.com."},{"key":"e_1_3_3_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308560.3316734"},{"key":"e_1_3_3_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517717"},{"key":"e_1_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.accfor.2012.02.003"},{"key":"e_1_3_3_55_1","doi-asserted-by":"crossref","unstructured":"Hristova D. Dumit J. Lieberoth A. & Slunecko T. (2020). Snapchat streaks: How adolescents metagame gamification in social media. In Gamifin (pp. 126\u2013135).","DOI":"10.31234\/osf.io\/nszex"},{"key":"e_1_3_3_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675202"},{"key":"e_1_3_3_57_1","unstructured":"Hughes T. Smith J. & Leavitt A. (2018). Helping people better assess the stories they see in news feed with the context button| facebook newsroom. Facebook Newsroom"},{"key":"e_1_3_3_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534561"},{"key":"e_1_3_3_59_1","volume-title":"Designing with the mind in mind: Simple guide to understanding user interface design guidelines","author":"Johnson J.","year":"2020","unstructured":"Johnson, J. (2020). Designing with the mind in mind: Simple guide to understanding user interface design guidelines. Morgan Kaufmann."},{"key":"e_1_3_3_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1125451.1125541"},{"key":"e_1_3_3_61_1","first-page":"1","volume-title":"Proceedings of the 21st annual workshop of the australasian language technology association","author":"Joy S. S.","year":"2023","unstructured":"Joy, S. S., Aishi, T. D., Nodi, N. T., & Rasel, A. A. (2023). Banglaclickbert: Bangla clickbait detection from news headlines using domain adaptive banglabert and mlp techniques. In Proceedings of the 21st annual workshop of the australasian language technology association (pp. 1\u201310)."},{"key":"e_1_3_3_62_1","first-page":"1163","volume-title":"30th Usenix Security Symposium (Usenix Security 21)","author":"Kaiser B.","year":"2021","unstructured":"Kaiser, B., Wei, J., Lucherini, E., Lee, K., Matias, J. N., & Mayer, J. (2021). Adapting security warnings to counter online disinformation. In 30th Usenix Security Symposium (Usenix Security 21) (pp. 1163\u20131180)."},{"key":"e_1_3_3_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2015.01.004"},{"key":"e_1_3_3_64_1","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.467"},{"issue":"3","key":"e_1_3_3_65_1","first-page":"44","article-title":"True tales and tall tales: The power of organizational storytelling","volume":"53","author":"Kaye B.","year":"1999","unstructured":"Kaye, B., & Jacobson, B. (1999). True tales and tall tales: The power of organizational storytelling. Training & Development, 53(3), 44\u201351.","journal-title":"Training & Development,"},{"key":"e_1_3_3_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2018.08.031"},{"key":"e_1_3_3_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209978.3210144"},{"key":"e_1_3_3_68_1","doi-asserted-by":"publisher","DOI":"10.1111\/apps.12108"},{"key":"e_1_3_3_69_1","doi-asserted-by":"publisher","DOI":"10.1177\/1529100612451018"},{"key":"e_1_3_3_70_1","doi-asserted-by":"publisher","DOI":"10.1080\/10463283.2021.1876983"},{"key":"e_1_3_3_71_1","first-page":"27","volume-title":"Soups 2016-proceedings of the 12th symposium on usable privacy and security","author":"Liu B.","year":"2016","unstructured":"Liu, B., Schaarup Andersen, M., Schaub, F., Almuhimedi, H., Zhang, S., Sadeh, N., & Agarwal, Y. (2016). Follow my recommendations: A personalized privacy assistant for mobile app permissions. In Soups 2016-proceedings of the 12th symposium on usable privacy and security (pp. 27\u201341)."},{"key":"e_1_3_3_72_1","unstructured":"Lyons T. (2017). Replacing disputed flags with related articles. Facebook Newsroom 20."},{"key":"e_1_3_3_73_1","unstructured":"Marwick A. E. & Lewis R. (2017). Media manipulation and disinformation online."},{"key":"e_1_3_3_74_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12160-013-9486-6"},{"key":"e_1_3_3_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445753"},{"key":"e_1_3_3_76_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11292-022-09504-2"},{"key":"e_1_3_3_77_1","unstructured":"Mosseri A. (2018). Helping ensure news on facebook is from trusted sources. Facebook Newsroom. Online verf\u00fcgbar unter https:\/\/newsroom.fb.com\/news\/2018\/01\/trusted-sources\/ zuletzt aktualisiert am 19 2018."},{"key":"e_1_3_3_78_1","doi-asserted-by":"publisher","DOI":"10.4304\/tpls.3.11.1939-1945"},{"key":"e_1_3_3_79_1","article-title":"User centered system design","author":"Norman D.","year":"1986","unstructured":"Norman, D. (1986). User centered system design. New Perspectives on Human-Computer Interaction.","journal-title":"New Perspectives on Human-Computer Interaction"},{"key":"e_1_3_3_80_1","volume-title":"Persuasion: Theory and research","author":"O\u2019Keefe D. J.","year":"2015","unstructured":"O\u2019Keefe, D. J. (2015). Persuasion: Theory and research. Sage Publications."},{"key":"e_1_3_3_81_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jesp.2009.03.009"},{"key":"e_1_3_3_82_1","unstructured":"O\u2019Donnell A. (2018 May). What is clickbait?: What\u2019s really happening when you click that link to finish an irresistible story. https:\/\/www.lifewire.com\/the-dark-side-of-clickbait-2487506"},{"key":"e_1_3_3_83_1","first-page":"269","volume-title":"The SAGE handbook of media processes and eflects","author":"O\u2019Keefe D. J.","year":"2009","unstructured":"O\u2019Keefe, D. J. (2009). Theories of persuasion. The SAGE handbook of media processes and eflects. 269\u2013282."},{"key":"e_1_3_3_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/3637387"},{"key":"e_1_3_3_85_1","first-page":"298","volume-title":"Companion publication of the 2023 conference on computer supported cooperative work and social computing","author":"Paudel R.","year":"2023","unstructured":"Paudel, R., Shrestha, A., Dumaru, P., & Al-Ameen, M. N. (2023). \u201cIt doesn\u2019t just feel like something a lawyer slapped together.\u201d mental-model-based privacy policy for third-party applications on facebook [Paper presentation]. Companion publication of the 2023 conference on computer supported cooperative work and social computing (pp. 298\u2013306)."},{"key":"e_1_3_3_86_1","doi-asserted-by":"publisher","DOI":"10.5406\/jamerfolk.133.529.0329"},{"key":"e_1_3_3_87_1","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-013-0434-y"},{"key":"e_1_3_3_88_1","unstructured":"Pengnate S. F. (2016). Measuring emotional arousal in clickbait: Eye-tracking approach."},{"key":"e_1_3_3_89_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2019.3478"},{"key":"e_1_3_3_90_1","doi-asserted-by":"publisher","DOI":"10.1177\/01461672211023652"},{"key":"e_1_3_3_91_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cognition.2018.06.011"},{"key":"e_1_3_3_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445051"},{"key":"e_1_3_3_93_1","first-page":"1498","volume-title":"Proceedings of the 27th international conference on computational linguistics","author":"Potthast M.","year":"2018","unstructured":"Potthast, M., Gollub, T., Komlossy, K., Schuster, S., Wiegmann, M., Fernandez, E. P. G., & Stein, B. (2018). Crowdsourcing a large corpus of clickbait on twitter. In Proceedings of the 27th international conference on computational linguistics (pp. 1498\u20131507)."},{"key":"e_1_3_3_94_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-30671-1_72"},{"key":"e_1_3_3_95_1","doi-asserted-by":"publisher","DOI":"10.2307\/1956436"},{"key":"e_1_3_3_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRITO61523.2024.10522359"},{"key":"e_1_3_3_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173786"},{"key":"e_1_3_3_98_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174086"},{"key":"e_1_3_3_99_1","unstructured":"Rides K. (2017 August). Clickbait malware sites. https:\/\/www.linkedin.com\/pulse\/clickbait-malware-sites-kris-rides\/"},{"key":"e_1_3_3_100_1","unstructured":"Roth Y. & Harvey D. (2018 June). How twitter is fighting spam and malicious automation. Twitter [blog]."},{"key":"e_1_3_3_101_1","doi-asserted-by":"crossref","unstructured":"Rukonic L. Mwange M.-A. P. & Kieffer S. (2021). Ux design and evaluation of warning alerts for semi-autonomous cars with elderly drivers. In Visigrapp (2: Hucapp) (pp. 25\u201336).","DOI":"10.5220\/0010237000250036"},{"key":"e_1_3_3_102_1","unstructured":"Saf. (2019). Information operations directed at Hong Kong. (Vol. 19)."},{"key":"e_1_3_3_103_1","unstructured":"Schrepp M. (2015). User experience questionnaire handbook. All you need to know to apply the UEQ successfully in your project 50\u201352."},{"key":"e_1_3_3_104_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07668-3_37"},{"key":"e_1_3_3_105_1","doi-asserted-by":"publisher","DOI":"10.1006\/jesp.1993.1003"},{"key":"e_1_3_3_106_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pragma.2020.12.023"},{"key":"e_1_3_3_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517646"},{"key":"e_1_3_3_108_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872518.2890098"},{"key":"e_1_3_3_109_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-018-06930-7"},{"key":"e_1_3_3_110_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2024.2323248"},{"key":"e_1_3_3_111_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642301"},{"key":"e_1_3_3_112_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-35822-7_8"},{"key":"e_1_3_3_113_1","doi-asserted-by":"publisher","DOI":"10.1145\/3616383"},{"key":"e_1_3_3_114_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2018.00062"},{"key":"e_1_3_3_115_1","doi-asserted-by":"publisher","DOI":"10.4324\/9780203933039"},{"key":"e_1_3_3_116_1","unstructured":"Souza F. (2015 June). Analyzing a Facebook clickbait worm. https:\/\/blog.sucuri.net\/2015\/06\/analyzing-a-facebook-clickbait-worm.html"},{"key":"e_1_3_3_117_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v12i1.15009"},{"key":"e_1_3_3_118_1","doi-asserted-by":"publisher","DOI":"10.2307\/1773082"},{"key":"e_1_3_3_119_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.66.4.742"},{"key":"e_1_3_3_120_1","unstructured":"Su S. (2017). New test with related articles. Facebook Newsroom April 25."},{"key":"e_1_3_3_121_1","doi-asserted-by":"publisher","DOI":"10.3961\/jpmph.20.094"},{"key":"e_1_3_3_122_1","unstructured":"Thorson E. (2015). Identifying and correcting policy misperceptions. Unpublished Paper George Washington University. http:\/\/www.americanpressinstitute.org\/wpcontent\/uploads\/2015\/04\/Project-2-Thorson-2015-Identifying-Political-Misperceptions-UPDATED-4-24.pdf"},{"key":"e_1_3_3_123_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3519661"},{"key":"e_1_3_3_124_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300755"},{"key":"e_1_3_3_125_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025896"},{"key":"e_1_3_3_126_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517588"},{"key":"e_1_3_3_127_1","doi-asserted-by":"publisher","DOI":"10.1080\/13504630.2020.1782730"},{"key":"e_1_3_3_128_1","unstructured":"Voinea D. V. (2022). Taking over twitter\u2013balancing free speech and content moderation."},{"key":"e_1_3_3_129_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.aap9559"},{"key":"e_1_3_3_130_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.01.070"},{"key":"e_1_3_3_131_1","doi-asserted-by":"publisher","DOI":"10.1509\/jmr.11.0368"},{"key":"e_1_3_3_132_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.2686031"},{"key":"e_1_3_3_133_1","doi-asserted-by":"publisher","DOI":"10.1177\/016146811912101102"},{"key":"e_1_3_3_134_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11109-018-9443-y"},{"key":"e_1_3_3_135_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.inlg-main.32"},{"key":"e_1_3_3_136_1","volume-title":"Mental models: Aligning design strategy with human behavior","author":"Young I.","year":"2008","unstructured":"Young, I. (2008). Mental models: Aligning design strategy with human behavior. Rosenfeld Media."},{"key":"e_1_3_3_137_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00018"},{"key":"e_1_3_3_138_1","unstructured":"Zeng E. Kohno T. & Roesner F. (2020). Bad news: Clickbait and deceptive ads on news and misinformation websites. In Workshop on technology and consumer protection."},{"key":"e_1_3_3_139_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3501889"},{"key":"e_1_3_3_140_1","doi-asserted-by":"publisher","DOI":"10.3390\/sym10050138"},{"key":"e_1_3_3_141_1","unstructured":"Zhou Y. (2017). Clickbait detection in tweets using self-attentive network. arXiv preprint arXiv:1710.05364."},{"key":"e_1_3_3_142_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2022.2042384"},{"key":"e_1_3_3_143_1","unstructured":"ZoneAlarm.com. (2016 March). Click bait scams you should stay away from on social media. https:\/\/www.zonealarm.com\/blog\/2016\/03\/click-bait-scams-in-social-media\/"}],"container-title":["International Journal of Human\u2013Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10447318.2025.2464890","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,7]],"date-time":"2025-10-07T11:50:17Z","timestamp":1759837817000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10447318.2025.2464890"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,3]]},"references-count":142,"journal-issue":{"issue":"20","published-print":{"date-parts":[[2025,10,18]]}},"alternative-id":["10.1080\/10447318.2025.2464890"],"URL":"https:\/\/doi.org\/10.1080\/10447318.2025.2464890","relation":{},"ISSN":["1044-7318","1532-7590"],"issn-type":[{"value":"1044-7318","type":"print"},{"value":"1532-7590","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,3]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2024-05-15","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-12","order":1,"name":"revised","label":"Revised","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-01-29","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}