{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:00:00Z","timestamp":1776114000886,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":90,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,9,8]],"date-time":"2015-09-08T00:00:00Z","timestamp":1441670400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1528070"],"award-info":[{"award-number":["CNS-1528070"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"United States-Israel Binational Science Foundation","award":["2014626"],"award-info":[{"award-number":["2014626"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,9,8]]},"DOI":"10.1145\/2841113.2841115","type":"proceedings-article","created":{"date-parts":[[2015,12,10]],"date-time":"2015-12-10T19:49:49Z","timestamp":1449776989000},"page":"16-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":73,"title":["The Myth of the Average User"],"prefix":"10.1145","author":[{"given":"Serge","family":"Egelman","sequence":"first","affiliation":[{"name":"International Computer Science Institute, Berkeley, CA, USA"}]},{"given":"Eyal","family":"Peer","sequence":"additional","affiliation":[{"name":"Bar-Ilan University, Ramat Gan, Israel"}]}],"member":"320","published-online":{"date-parts":[[2015,9,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"The theory of planned behavior. Organizational behavior and human decision processes, 50(2):179--211","author":"Ajzen I.","year":"1991","unstructured":"I. Ajzen . The theory of planned behavior. Organizational behavior and human decision processes, 50(2):179--211 , 1991 . I. Ajzen. The theory of planned behavior. Organizational behavior and human decision processes, 50(2):179--211, 1991."},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 22nd USENIX Security Symposium","author":"Akhawe D.","year":"2013","unstructured":"D. Akhawe and A. P. Felt . Alice in warningland: A large-scale field study of browser warning effectiveness . In Proceedings of the 22nd USENIX Security Symposium , 2013 . D. Akhawe and A. P. Felt. Alice in warningland: A large-scale field study of browser warning effectiveness. In Proceedings of the 22nd USENIX Security Symposium, 2013."},{"issue":"3","key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1017\/S1930297500001455","article-title":"The decision making individual differences inventory and guidelines for the study of individual differences in judgment and decision-making research","volume":"6","author":"Appelt K. C.","year":"2011","unstructured":"K. C. Appelt , K. F. Milch , M. Handgraaf , and E. U. Weber . The decision making individual differences inventory and guidelines for the study of individual differences in judgment and decision-making research . Judgment and Decision Making , 6 ( 3 ): 252 -- 262 , April 2011 . K. C. Appelt, K. F. Milch, M. Handgraaf, and E. U. Weber. The decision making individual differences inventory and guidelines for the study of individual differences in judgment and decision-making research. Judgment and Decision Making, 6(3):252--262, April 2011.","journal-title":"Judgment and Decision Making"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435362"},{"key":"e_1_3_2_1_6_1","volume-title":"CHI 2011 workshop article","author":"Balebako R.","year":"2011","unstructured":"R. Balebako , P. G. Leon , H. Almuhimedi , P. G. Kelley , J. Mugan , A. Acquisti , L. F. Cranor , and N. Sadeh . Nudging users towards privacy on mobile devices . In CHI 2011 workshop article , 2011 . R. Balebako, P. G. Leon, H. Almuhimedi, P. G. Kelley, J. Mugan, A. Acquisti, L. F. Cranor, and N. Sadeh. Nudging users towards privacy on mobile devices. In CHI 2011 workshop article, 2011."},{"key":"e_1_3_2_1_7_1","volume-title":"User's manual for the Job Descriptive Index (JDI","author":"Balzer W. K.","year":"1997","unstructured":"W. K. Balzer . User's manual for the Job Descriptive Index (JDI ; 1997 revision) and the Job in General (JIG) scales. Bowling Green State University , 1997. W. K. Balzer. User's manual for the Job Descriptive Index (JDI; 1997 revision) and the Job in General (JIG) scales. Bowling Green State University, 1997."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595676.1595684"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837120"},{"issue":"1","key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1017\/S1930297500000334","article-title":"A domain-specific risk-taking (dospert) scale for adult populations","volume":"1","author":"Blais A.-R.","year":"2006","unstructured":"A.-R. Blais and E. U. Weber . A domain-specific risk-taking (dospert) scale for adult populations . Judgment and Decision Making , 1 ( 1 ): 33 -- 47 , 2006 . A.-R. Blais and E. U. Weber. A domain-specific risk-taking (dospert) scale for adult populations. Judgment and Decision Making, 1(1):33--47, 2006.","journal-title":"Judgment and Decision Making"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.117.2.187"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1943403.1943449"},{"key":"e_1_3_2_1_13_1","volume-title":"Cengage Learning","author":"Boone L.","year":"2013","unstructured":"L. Boone and D. Kurtz . Contemporary Marketing . Cengage Learning , 2013 . L. Boone and D. Kurtz. Contemporary Marketing. Cengage Learning, 2013."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.v58:2"},{"key":"e_1_3_2_1_15_1","volume-title":"The efficient assessment of need for cognition. Journal of personality assessment, 48(3):306--307","author":"Cacioppo J. T.","year":"1984","unstructured":"J. T. Cacioppo , R. E. Petty , and C. Feng Kao . The efficient assessment of need for cognition. Journal of personality assessment, 48(3):306--307 , 1984 . J. T. Cacioppo, R. E. Petty, and C. Feng Kao. The efficient assessment of need for cognition. Journal of personality assessment, 48(3):306--307, 1984."},{"key":"e_1_3_2_1_16_1","volume-title":"Effects of need for cognition on message evaluation, recall, and persuasion. Journal of personality and social psychology, 45(4):805","author":"Cacioppo J. T.","year":"1983","unstructured":"J. T. Cacioppo , R. E. Petty , and K. J. Morris . Effects of need for cognition on message evaluation, recall, and persuasion. Journal of personality and social psychology, 45(4):805 , 1983 . J. T. Cacioppo, R. E. Petty, and K. J. Morris. Effects of need for cognition on message evaluation, recall, and persuasion. Journal of personality and social psychology, 45(4):805, 1983."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1086\/208501"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1111\/jeea.12011"},{"key":"e_1_3_2_1_19_1","volume-title":"The revised neo personality inventory (neo-pi-r). The SAGE handbook of personality theory and assessment, 2:179--198","author":"Costa P. T.","year":"2008","unstructured":"P. T. Costa and R. R. McCrae . The revised neo personality inventory (neo-pi-r). The SAGE handbook of personality theory and assessment, 2:179--198 , 2008 . P. T. Costa and R. R. McCrae. The revised neo personality inventory (neo-pi-r). The SAGE handbook of personality theory and assessment, 2:179--198, 2008."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1530-0277.2011.01635.x"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1387649.1387650"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357219"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702249"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_5"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481329"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557292"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242661"},{"key":"e_1_3_2_1_30_1","first-page":"25","volume-title":"Journal of Economic perspectives","author":"Frederick S.","year":"2005","unstructured":"S. Frederick . Cognitive reflection and decision making. Journal of Economic perspectives , pages 25 -- 42 , 2005 . S. Frederick. Cognitive reflection and decision making. Journal of Economic perspectives, pages 25--42, 2005."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2006.03.003"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31680-7_15"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1086\/589562"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0092-6566(03)00046-1"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557398"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1057-7408(08)80038-1"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1509\/jmkr.47.5.854"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1080\/08959285.1992.9667929"},{"key":"e_1_3_2_1_39_1","article-title":"Born This Way","author":"Issenberg S.","year":"2012","unstructured":"S. Issenberg . Born This Way . New York Magazine , April 12 2012 . http:\/\/nymag.com\/news\/features\/liberals-conservatives-2012-4\/. S. Issenberg. Born This Way. New York Magazine, April 12 2012. http:\/\/nymag.com\/news\/features\/liberals-conservatives-2012-4\/.","journal-title":"New York Magazine"},{"key":"e_1_3_2_1_40_1","first-page":"18","article-title":"Nudging whom how: It proficiency, impulse control and secure behaviour","volume":"49","author":"Jeske D.","year":"2014","unstructured":"D. Jeske , L. Coventry , P. Briggs , and A. van Moorsel . Nudging whom how: It proficiency, impulse control and secure behaviour . Networks , 49 : 18 , 2014 . D. Jeske, L. Coventry, P. Briggs, and A. van Moorsel. Nudging whom how: It proficiency, impulse control and secure behaviour. Networks, 49:18, 2014.","journal-title":"Networks"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1086\/656423"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1091721"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11002-012-9186-1"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1177\/0146167212449362"},{"key":"e_1_3_2_1_45_1","volume-title":"Five-factor model of personality and transformational leadership. Journal of applied psychology, 85(5):751","author":"Judge T. A.","year":"2000","unstructured":"T. A. Judge and J. E. Bono . Five-factor model of personality and transformational leadership. Journal of applied psychology, 85(5):751 , 2000 . T. A. Judge and J. E. Bono. Five-factor model of personality and transformational leadership. Journal of applied psychology, 85(5):751, 2000."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2008.29"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2379616.2379623"},{"issue":"4","key":"e_1_3_2_1_48_1","first-page":"15","article-title":"The influence of personality traits and information privacy concerns on behavioral intentions","volume":"48","author":"Korzaan M. L.","year":"2008","unstructured":"M. L. Korzaan and K. T. Boswell . The influence of personality traits and information privacy concerns on behavioral intentions . Journal of Computer Information Systems , 48 ( 4 ): 15 -- 24 , 2008 . M. L. Korzaan and K. T. Boswell. The influence of personality traits and information privacy concerns on behavioral intentions. Journal of Computer Information Systems, 48(4):15--24, 2008.","journal-title":"Journal of Computer Information Systems"},{"key":"e_1_3_2_1_49_1","volume-title":"Marketing Management","author":"Kotler P.","year":"2006","unstructured":"P. Kotler and K. Keller . Marketing Management . Pearson Prentice Hall , 2006 . P. Kotler and K. Keller. Marketing Management. Pearson Prentice Hall, 2006."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1006\/obhd.2001.2983"},{"key":"e_1_3_2_1_53_1","volume-title":"All frames are not created equal: A typology and critical analysis of framing effects. Organizational behavior and human decision processes, 76(2):149--188","author":"Levin I. P.","year":"1998","unstructured":"I. P. Levin , S. L. Schneider , and G. J. Gaeth . All frames are not created equal: A typology and critical analysis of framing effects. Organizational behavior and human decision processes, 76(2):149--188 , 1998 . I. P. Levin, S. L. Schneider, and G. J. Gaeth. All frames are not created equal: A typology and critical analysis of framing effects. Organizational behavior and human decision processes, 76(2):149--188, 1998."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1177\/0272989X0102100105"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.2307\/1251955"},{"key":"e_1_3_2_1_56_1","volume-title":"National bureau of economic research","author":"Madrian B. C.","year":"2000","unstructured":"B. C. Madrian and D. F. Shea . The power of suggestion: Inertia in 401 (k) participation and savings behavior. Technical report , National bureau of economic research , 2000 . B. C. Madrian and D. F. Shea. The power of suggestion: Inertia in 401 (k) participation and savings behavior. Technical report, National bureau of economic research, 2000."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"e_1_3_2_1_58_1","volume-title":"A comprehensive meta-analysis of the relationship between emotional intelligence and health. Personality and individual differences, 49(6):554--564","author":"Martins A.","year":"2010","unstructured":"A. Martins , N. Ramalho , and E. Morin . A comprehensive meta-analysis of the relationship between emotional intelligence and health. Personality and individual differences, 49(6):554--564 , 2010 . A. Martins, N. Ramalho, and E. Morin. A comprehensive meta-analysis of the relationship between emotional intelligence and health. Personality and individual differences, 49(6):554--564, 2010."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.21500\/20112084.854"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866919.1866929"},{"key":"e_1_3_2_1_61_1","volume-title":"38th Research Conference on Communication, Information and Internet Policy (Telecommunications Policy Research Conference)","author":"McDonald A. M.","year":"2010","unstructured":"A. M. McDonald and L. F. Cranor . Beliefs and behaviors: Internet users' understanding of behavioral advertising . In 38th Research Conference on Communication, Information and Internet Policy (Telecommunications Policy Research Conference) , October 2 2010 . A. M. McDonald and L. F. Cranor. Beliefs and behaviors: Internet users' understanding of behavioral advertising. In 38th Research Conference on Communication, Information and Internet Policy (Telecommunications Policy Research Conference), October 2 2010."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1037\/10802-000"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1620693.1620708"},{"key":"e_1_3_2_1_64_1","volume-title":"Factor structure of the barratt impulsiveness scale. Journal of clinical psychology, 51(6):768--774","author":"Patton J. H.","year":"1995","unstructured":"J. H. Patton , M. S. Stanford , Factor structure of the barratt impulsiveness scale. Journal of clinical psychology, 51(6):768--774 , 1995 . J. H. Patton, M. S. Stanford, et al. Factor structure of the barratt impulsiveness scale. Journal of clinical psychology, 51(6):768--774, 1995."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1080\/00223980.1982.9923528"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9280.2006.01720.x"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357285"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0017327"},{"key":"e_1_3_2_1_69_1","volume-title":"Temperament and personality: origins and outcomes. Journal of personality and social psychology, 78(1):122","author":"Rothbart M. K.","year":"2000","unstructured":"M. K. Rothbart , S. A. Ahadi , and D. E. Evans . Temperament and personality: origins and outcomes. Journal of personality and social psychology, 78(1):122 , 2000 . M. K. Rothbart, S. A. Ahadi, and D. E. Evans. Temperament and personality: origins and outcomes. Journal of personality and social psychology, 78(1):122, 2000."},{"key":"e_1_3_2_1_70_1","volume-title":"International review of industrial and organizational psychology, 10:75--130","author":"Schneider R. J.","year":"1995","unstructured":"R. J. Schneider and L. M. Hough . Personality and industrial\/organizational psychology . International review of industrial and organizational psychology, 10:75--130 , 1995 . R. J. Schneider and L. M. Hough. Personality and industrial\/organizational psychology. International review of industrial and organizational psychology, 10:75--130, 1995."},{"key":"e_1_3_2_1_71_1","volume-title":"Decision-making style: The development and assessment of a new measure. Educational and psychological measurement, 55(5):818--831","author":"Scott S. G.","year":"1995","unstructured":"S. G. Scott and R. A. Bruce . Decision-making style: The development and assessment of a new measure. Educational and psychological measurement, 55(5):818--831 , 1995 . S. G. Scott and R. A. Bruce. Decision-making style: The development and assessment of a new measure. Educational and psychological measurement, 55(5):818--831, 1995."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-0771(199612)9:4<283::AID-BDM241>3.0.CO;2-7"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1177\/002224295602100102"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078831"},{"key":"e_1_3_2_1_75_1","volume-title":"Individual differences in rational thought. Journal of experimental psychology: general, 127(2):161","author":"Stanovich K. E.","year":"1998","unstructured":"K. E. Stanovich and R. F. West . Individual differences in rational thought. Journal of experimental psychology: general, 127(2):161 , 1998 . K. E. Stanovich and R. F. West. Individual differences in rational thought. Journal of experimental psychology: general, 127(2):161, 1998."},{"key":"e_1_3_2_1_76_1","volume-title":"Short, homogeneous versions of the marlowe-crowne social desirability scale. Journal of clinical psychology","author":"Strahan R.","year":"1972","unstructured":"R. Strahan and K. C. Gerbasi . Short, homogeneous versions of the marlowe-crowne social desirability scale. Journal of clinical psychology , 1972 . R. Strahan and K. C. Gerbasi. Short, homogeneous versions of the marlowe-crowne social desirability scale. Journal of clinical psychology, 1972."},{"key":"e_1_3_2_1_77_1","first-page":"399","volume-title":"Proceedings of the 18th USENIX Security Symposium, SSYM'09","author":"Sunshine J.","year":"2009","unstructured":"J. Sunshine , S. Egelman , H. Almuhimedi , N. Atri , and L. F. Cranor . Crying wolf: an empirical study of ssl warning effectiveness . In Proceedings of the 18th USENIX Security Symposium, SSYM'09 , pages 399 -- 416 , Berkeley, CA, USA , 2009 . USENIX Association. J. Sunshine, S. Egelman, H. Almuhimedi, N. Atri, and L. F. Cranor. Crying wolf: an empirical study of ssl warning effectiveness. In Proceedings of the 18th USENIX Security Symposium, SSYM'09, pages 399--416, Berkeley, CA, USA, 2009. USENIX Association."},{"key":"e_1_3_2_1_78_1","volume-title":"Nudge: Improving decisions about health, wealth, and happiness","author":"Thaler R.","year":"2008","unstructured":"R. Thaler and C. Sunstein . Nudge: Improving decisions about health, wealth, and happiness . Yale University Press , New Haven and London, 2008 . R. Thaler and C. Sunstein. Nudge: Improving decisions about health, wealth, and happiness. Yale University Press, New Haven and London, 2008."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.7455683"},{"key":"e_1_3_2_1_80_1","volume-title":"https:\/\/www.us-cert.gov\/ncas\/tips. Accessed","author":"United States Computer Emergency Readiness Team. Tips.","year":"2014","unstructured":"United States Computer Emergency Readiness Team. Tips. https:\/\/www.us-cert.gov\/ncas\/tips. Accessed : September 12, 2014 . United States Computer Emergency Readiness Team. Tips. https:\/\/www.us-cert.gov\/ncas\/tips. Accessed: September 12, 2014."},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335362"},{"key":"e_1_3_2_1_82_1","volume-title":"http:\/\/www.verizon.com\/Support\/Residential\/Internet\/FiosInternet\/General+Support\/Security\/Security.htm","year":"2014","unstructured":"Verizon. Security. http:\/\/www.verizon.com\/Support\/Residential\/Internet\/FiosInternet\/General+Support\/Security\/Security.htm , 2014 . Accessed : September 12, 2014. Verizon. Security. http:\/\/www.verizon.com\/Support\/Residential\/Internet\/FiosInternet\/General+Support\/Security\/Security.htm, 2014. Accessed: September 12, 2014."},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557413"},{"key":"e_1_3_2_1_84_1","first-page":"1307","article-title":"The second wave of global privacy protection: From facebook regrets to facebook privacy nudges","volume":"74","author":"Wang Y.","year":"2013","unstructured":"Y. Wang , P. G. Leon , X. Chen , S. Komanduri , G. Norcie , K. Scott , A. Acquisti , L. F. Cranor , and N. Sadeh . The second wave of global privacy protection: From facebook regrets to facebook privacy nudges . Ohio State Law Journal , 74 : 1307 -- 1335 , 2013 . Y. Wang, P. G. Leon, X. Chen, S. Komanduri, G. Norcie, K. Scott, A. Acquisti, L. F. Cranor, and N. Sadeh. The second wave of global privacy protection: From facebook regrets to facebook privacy nudges. Ohio State Law Journal, 74:1307--1335, 2013.","journal-title":"Ohio State Law Journal"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488038"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1201\/9781482289688","volume-title":"Handbook of Warnings","author":"Wogalter M. S.","year":"2006","unstructured":"M. S. Wogalter . Communication-Human Information Processing (C-HIP) Model . In M. S. Wogalter, editor, Handbook of Warnings , pages 51 -- 61 . Lawrence Erlbaum Associates , 2006 . M. S. Wogalter. Communication-Human Information Processing (C-HIP) Model. In M. S. Wogalter, editor, Handbook of Warnings, pages 51--61. Lawrence Erlbaum Associates, 2006."},{"key":"e_1_3_2_1_87_1","first-page":"1","volume-title":"Proceedings of the 2014 Symposium on Usable Privacy and Security","author":"Woodruff A.","year":"2014","unstructured":"A. Woodruff , V. Pihur , S. Consolvo , L. Brandimarte , and A. Acquisti . Would a privacy fundamentalist sell their dna for $1000...if nothing bad happened as a result? the westin categories, behavioral intentions, and consequences . In Proceedings of the 2014 Symposium on Usable Privacy and Security , pages 1 -- 18 . USENIX Association , 2014 . A. Woodruff, V. Pihur, S. Consolvo, L. Brandimarte, and A. Acquisti. Would a privacy fundamentalist sell their dna for $1000...if nothing bad happened as a result? the westin categories, behavioral intentions, and consequences. In Proceedings of the 2014 Symposium on Usable Privacy and Security, pages 1--18. USENIX Association, 2014."},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124863"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00281"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.11.017"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526745"},{"key":"e_1_3_2_1_92_1","volume-title":"The Wall Street Journal, 2002","author":"Zaslow J.","year":"1936","unstructured":"J. Zaslow . If tivo thinks you are gay, here's how to set it straight . The Wall Street Journal, 2002 . http:\/\/www.wsj.com\/articles\/SB103826 1936 872356908. J. Zaslow. If tivo thinks you are gay, here's how to set it straight. The Wall Street Journal, 2002. http:\/\/www.wsj.com\/articles\/SB1038261936872356908."},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1080\/00913367.1999.10673580"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/304851.304859"}],"event":{"name":"NSPW '15: New Security Paradigms Workshop","location":"Twente Netherlands","acronym":"NSPW '15","sponsor":["ACSA Applied Computing Security Assoc"]},"container-title":["Proceedings of the 2015 New Security Paradigms Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2841113.2841115","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2841113.2841115","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:53:47Z","timestamp":1750222427000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2841113.2841115"}},"subtitle":["Improving Privacy and Security Systems through Individualization"],"short-title":[],"issued":{"date-parts":[[2015,9,8]]},"references-count":90,"alternative-id":["10.1145\/2841113.2841115","10.1145\/2841113"],"URL":"https:\/\/doi.org\/10.1145\/2841113.2841115","relation":{},"subject":[],"published":{"date-parts":[[2015,9,8]]},"assertion":[{"value":"2015-09-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}