{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T18:49:35Z","timestamp":1776106175365,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,4,26]],"date-time":"2014-04-26T00:00:00Z","timestamp":1398470400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,4,26]]},"DOI":"10.1145\/2556288.2556978","type":"proceedings-article","created":{"date-parts":[[2014,4,28]],"date-time":"2014-04-28T14:18:30Z","timestamp":1398694710000},"page":"2647-2656","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":121,"title":["Using personal examples to improve risk communication for security &amp; privacy decisions"],"prefix":"10.1145","author":[{"given":"Marian","family":"Harbach","sequence":"first","affiliation":[{"name":"Leibniz University Hannover, Hannover, Germany"}]},{"given":"Markus","family":"Hettig","sequence":"additional","affiliation":[{"name":"Leibniz University Hannover, Hannover, Germany"}]},{"given":"Susanne","family":"Weber","sequence":"additional","affiliation":[{"name":"Leibniz University Hannover, Hannover, Germany"}]},{"given":"Matthew","family":"Smith","sequence":"additional","affiliation":[{"name":"Leibniz University Hannover, Hannover, Germany"}]}],"member":"320","published-online":{"date-parts":[[2014,4,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572535"},{"key":"e_1_3_2_1_3_1","volume-title":"Proc. Psychology of Programming Interest Group (PPIG) Workshop","author":"Blackwell A. F.","year":"2008","unstructured":"Blackwell , A. F. , Church , L. , and Green , T . The Abstract is 'an Enemy '. In Proc. Psychology of Programming Interest Group (PPIG) Workshop ( 2008 ). Blackwell, A. F., Church, L., and Green, T. The Abstract is 'an Enemy'. In Proc. Psychology of Programming Interest Group (PPIG) Workshop (2008)."},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. SOUPS","author":"Bravo-Lillo C.","year":"2010","unstructured":"Bravo-Lillo , C. , Cranor , L. , Downs , J. , and Komanduri , S . What Is Still Wrong With Security Warnings: A Mental Models Approach . In Proc. SOUPS ( 2010 ). Bravo-Lillo, C., Cranor, L., Downs, J., and Komanduri, S. What Is Still Wrong With Security Warnings: A Mental Models Approach. In Proc. SOUPS (2010)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.198"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501610"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/2042283.2042286"},{"key":"e_1_3_2_1_8_1","volume-title":"A Framework for Reasoning About the Human in the Loop. UPSEC","author":"Cranor L.","year":"2008","unstructured":"Cranor , L. A Framework for Reasoning About the Human in the Loop. UPSEC ( 2008 ). Cranor, L. A Framework for Reasoning About the Human in the Loop. UPSEC (2008)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073004"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481328"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357219"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41320-9_7"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335359"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1408664.1408675"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124787"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466466"},{"key":"e_1_3_2_1_20_1","volume-title":"Proc. USENIX Security Symposium","author":"Pandita R.","year":"2013","unstructured":"Pandita , R. , Xiao , X. , Yang , W. , Enck , W. , and Xie , T . WHYPER: Towards Automating Risk Assessment of Mobile Applications . In Proc. USENIX Security Symposium ( 2013 ). Pandita, R., Xiao, X., Yang, W., Enck, W., and Xie, T. WHYPER: Towards Automating Risk Assessment of Mobile Applications. In Proc. USENIX Security Symposium (2013)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335364"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078829"},{"key":"e_1_3_2_1_23_1","volume-title":"Proc. USENIX Security Symposium","author":"Sunshine J.","year":"2009","unstructured":"Sunshine , J. , Egelman , S. , Almuhimedi , H. , Atri , N. , and Cranor , L. F . Crying Wolf: An Empirical Study of SSL Warning Effectiveness . In Proc. USENIX Security Symposium ( 2009 ). Sunshine, J., Egelman, S., Almuhimedi, H., Atri, N., and Cranor, L. F. Crying Wolf: An Empirical Study of SSL Warning Effectiveness. In Proc. USENIX Security Symposium (2009)."},{"key":"e_1_3_2_1_24_1","volume-title":"A Consolidated Communication-Human Information Processing (C-HIP) Model. Warnings and Risk Communication","author":"Wogalter M.","year":"1999","unstructured":"Wogalter , M. , Dejoy , D. M. , and Laughery , K. R . A Consolidated Communication-Human Information Processing (C-HIP) Model. Warnings and Risk Communication ( 1999 ), 15'23. Wogalter, M., Dejoy, D. M., and Laughery, K. R. A Consolidated Communication-Human Information Processing (C-HIP) Model. Warnings and Risk Communication (1999), 15'23."},{"key":"e_1_3_2_1_25_1","first-page":"3","volume":"14","author":"Wogalter M. S.","year":"1994","unstructured":"Wogalter , M. S. , Racicot , B. M. , Kalsher , M. J. , and Noel Simpson , S. Personalization of Warning Signs: The Role of Perceived Relevance on Behavioral Compliance. International Journal of Industrial Ergonomics 14 , 3 ( 1994 ). Wogalter, M. S., Racicot, B. M., Kalsher, M. J., and Noel Simpson, S. Personalization of Warning Signs: The Role of Perceived Relevance on Behavioral Compliance. International Journal of Industrial Ergonomics 14, 3 (1994).","journal-title":"Personalization of Warning Signs: The Role of Perceived Relevance on Behavioral Compliance. International Journal of Industrial Ergonomics"}],"event":{"name":"CHI '14: CHI Conference on Human Factors in Computing Systems","location":"Toronto Ontario Canada","acronym":"CHI '14","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the SIGCHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2556288.2556978","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2556288.2556978","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:52Z","timestamp":1750232092000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2556288.2556978"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,26]]},"references-count":24,"alternative-id":["10.1145\/2556288.2556978","10.1145\/2556288"],"URL":"https:\/\/doi.org\/10.1145\/2556288.2556978","relation":{},"subject":[],"published":{"date-parts":[[2014,4,26]]},"assertion":[{"value":"2014-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}