{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:14:40Z","timestamp":1776111280433,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,2]],"date-time":"2017-05-02T00:00:00Z","timestamp":1493683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100010663","name":"European Research Council","doi-asserted-by":"publisher","award":["321135"],"award-info":[{"award-number":["321135"]}],"id":[{"id":"10.13039\/100010663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,5,2]]},"DOI":"10.1145\/3025453.3025509","type":"proceedings-article","created":{"date-parts":[[2017,5,3]],"date-time":"2017-05-03T12:34:28Z","timestamp":1493814868000},"page":"4242-4253","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["High Costs and Small Benefits"],"prefix":"10.1145","author":[{"given":"Francesco","family":"Vitale","sequence":"first","affiliation":[{"name":"Universit\u00e9 Paris-Saclay, Orsay, France"}]},{"given":"Joanna","family":"McGrenere","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, BC, Canada"}]},{"given":"Aur\u00e9lien","family":"Tabard","sequence":"additional","affiliation":[{"name":"Universit\u00e9 Lyon 1, Lyon, France"}]},{"given":"Michel","family":"Beaudouin-Lafon","sequence":"additional","affiliation":[{"name":"Universit\u00e9 Paris-Saclay, Orsay, France"}]},{"given":"Wendy E.","family":"Mackay","sequence":"additional","affiliation":[{"name":"Universit\u00e9 Paris-Saclay, Orsay, France"}]}],"member":"320","published-online":{"date-parts":[[2017,5,2]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Android N borrows Chrome OS code for \"seamless\" update installation | Ars Technica. http: \/\/arstechnica.com\/gadgets\/2016\/05\/android-n-borrows-c hrome-os-code-for-seamless-update-installation\/. (May","author":"Amadeo Ron","year":"2016","unstructured":"Ron Amadeo . 2016. Android N borrows Chrome OS code for \"seamless\" update installation | Ars Technica. http: \/\/arstechnica.com\/gadgets\/2016\/05\/android-n-borrows-c hrome-os-code-for-seamless-update-installation\/. (May 2016 ). ( Accessed on August 2, 2016). Ron Amadeo. 2016. Android N borrows Chrome OS code for \"seamless\" update installation | Ars Technica. http: \/\/arstechnica.com\/gadgets\/2016\/05\/android-n-borrows-c hrome-os-code-for-seamless-update-installation\/. (May 2016). (Accessed on August 2, 2016)."},{"key":"e_1_3_2_2_2_1","volume-title":"Get help with over-the-air iOS updates Apple Support. https:\/\/support.apple.com\/en-us\/HT201435. (June","year":"2016","unstructured":"Apple. 2016. Get help with over-the-air iOS updates Apple Support. https:\/\/support.apple.com\/en-us\/HT201435. (June 2016 ). ( Accessed on August 2, 2016). Apple. 2016. Get help with over-the-air iOS updates Apple Support. https:\/\/support.apple.com\/en-us\/HT201435. (June 2016). (Accessed on August 2, 2016)."},{"key":"e_1_3_2_2_3_1","unstructured":"Harry Brignull. 2013. Dark Patterns: inside the interfaces designed to trick you | The Verge. http:\/\/www.theverge.com\/2013\/8\/29\/4640308\/dark-patte rns-inside-the-interfaces-designed-to-trick-you. (Aug. 2013). (Accessed on July 28 2016).  Harry Brignull. 2013. Dark Patterns: inside the interfaces designed to trick you | The Verge. http:\/\/www.theverge.com\/2013\/8\/29\/4640308\/dark-patte rns-inside-the-interfaces-designed-to-trick-you. (Aug. 2013). (Accessed on July 28 2016)."},{"key":"e_1_3_2_2_4_1","unstructured":"Brad Chacos. 2016. Forced Windows 10 upgrades push users to dangerously disable Windows Update. http:\/\/www.pcworld.com\/article\/3075729\/windows\/fearin g-forced-windows-10-upgrades-users-are-disabling-cri tical-updates-at-their-own-risk.html. (May 2016). (Accessed on August 1 2016).  Brad Chacos. 2016. Forced Windows 10 upgrades push users to dangerously disable Windows Update. http:\/\/www.pcworld.com\/article\/3075729\/windows\/fearin g-forced-windows-10-upgrades-users-are-disabling-cri tical-updates-at-their-own-risk.html. (May 2016). (Accessed on August 1 2016)."},{"key":"e_1_3_2_2_5_1","unstructured":"David Coburn. 2014. How Apple's OS X Yosemite tracks you. https:\/\/www.washingtonpost.com\/posttv\/business\/t echnology\/how-apples-os-x-yosemite-tracks-you\/2014\/ 10\/22\/66df4386--59f1--11e4--9d6c-756a229d8b18_video.html. (Oct. 2014). (Accessed on August 8 2016).  David Coburn. 2014. How Apple's OS X Yosemite tracks you. https:\/\/www.washingtonpost.com\/posttv\/business\/t echnology\/how-apples-os-x-yosemite-tracks-you\/2014\/ 10\/22\/66df4386--59f1--11e4--9d6c-756a229d8b18_video.html. (Oct. 2014). (Accessed on August 8 2016)."},{"key":"e_1_3_2_2_6_1","unstructured":"Shane Dingman. 2016. Considering updating to Windows 10? The choice may be out of your hands - The Globe and Mail. http:\/\/www.theglobeandmail.com\/technology\/t ech-news\/considering-updating-to-windows-10-the-choic e-may-be-out-of-your-hands\/article28533377\/. (Feb. 2016). (Accessed on August 1 2016).  Shane Dingman. 2016. Considering updating to Windows 10? The choice may be out of your hands - The Globe and Mail. http:\/\/www.theglobeandmail.com\/technology\/t ech-news\/considering-updating-to-windows-10-the-choic e-may-be-out-of-your-hands\/article28533377\/. (Feb. 2016). (Accessed on August 1 2016)."},{"key":"e_1_3_2_2_8_1","volume-title":"Automatic update risks: can patching let a hacker in Network Security","author":"Dunn Kevin","year":"2004","unstructured":"Kevin Dunn . 2004. Automatic update risks: can patching let a hacker in Network Security 2004 , 7 (2004), 5--8. Kevin Dunn. 2004. Automatic update risks: can patching let a hacker in Network Security 2004, 7 (2004), 5--8."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.04.075"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-015-0053-y"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2015.12.010"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-57312-7_79"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.65.1.45"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1496091.1496094"},{"key":"e_1_3_2_2_15_1","unstructured":"Samuel Gibbs. 2016. Windows 10: Microsoft launches intrusive full-screen upgrade reminder | Technology | The Guardian. https:\/\/www.theguardian.com\/technology\/2016\/ jul\/04\/microsoft-windows-10-full-screen-upgrade-notif ication-pop-up-reminder. (July 2016). (Accessed on August 1 2016).  Samuel Gibbs. 2016. Windows 10: Microsoft launches intrusive full-screen upgrade reminder | Technology | The Guardian. https:\/\/www.theguardian.com\/technology\/2016\/ jul\/04\/microsoft-windows-10-full-screen-upgrade-notif ication-pop-up-reminder. (July 2016). (Accessed on August 1 2016)."},{"key":"e_1_3_2_2_16_1","unstructured":"Rob Griffiths. 2016. A useless analysis of OS X release dates | The Robservatory. http:\/\/robservatory.com\/a-use less-analysis-of-os-x-release-dates\/. (July 2016). (Accessed on August 1 2016).  Rob Griffiths. 2016. A useless analysis of OS X release dates | The Robservatory. http:\/\/robservatory.com\/a-use less-analysis-of-os-x-release-dates\/. (July 2016). (Accessed on August 1 2016)."},{"key":"e_1_3_2_2_17_1","volume-title":"Eleventh Symposium on Usable Privacy and Security (SOUPS","author":"Ion Iulia","year":"2015","unstructured":"Iulia Ion , Rob Reeder , and Sunny Consolvo . 2015 . \"... no one can hack my mind\": Comparing Expert and Non-Expert Security Practices . In Eleventh Symposium on Usable Privacy and Security (SOUPS 2015). 327--346. Iulia Ion, Rob Reeder, and Sunny Consolvo. 2015. \"... no one can hack my mind\": Comparing Expert and Non-Expert Security Practices. In Eleventh Symposium on Usable Privacy and Security (SOUPS 2015). 327--346."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9280.1993.tb00589.x"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2012.6415869"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000704"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2011.1"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/108844.108867"},{"key":"e_1_3_2_2_23_1","first-page":"177","article-title":"Responding to cognitive overload: Co-adaptation between users and technology","volume":"30","author":"Mackay Wendy E","year":"2000","unstructured":"Wendy E Mackay . 2000 . Responding to cognitive overload: Co-adaptation between users and technology . Intellectica 30 , 1 (2000), 177 -- 193 . Wendy E Mackay. 2000. Responding to cognitive overload: Co-adaptation between users and technology. Intellectica 30, 1 (2000), 177--193.","journal-title":"Intellectica"},{"key":"e_1_3_2_2_24_1","unstructured":"Andrew Martonik. 2015. Hey Google don't just change fundamental parts of my launcher without warning | Android Central. http:\/\/www.androidcentral.com\/googl e-dont-just-change-my-launcher-without-warning. (September 2015). (Accessed on September 10 2016).  Andrew Martonik. 2015. Hey Google don't just change fundamental parts of my launcher without warning | Android Central. http:\/\/www.androidcentral.com\/googl e-dont-just-change-my-launcher-without-warning. (September 2015). (Accessed on September 10 2016)."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/503376.503406"},{"key":"e_1_3_2_2_26_1","first-page":"187","article-title":"Are we all in the same\" bloat","volume":"2000","author":"McGrenere Joanna","year":"2000","unstructured":"Joanna McGrenere and Gale Moore . 2000 . Are we all in the same\" bloat \"? . In Graphics interface , Vol. 2000. 187 -- 196 . Joanna McGrenere and Gale Moore. 2000. Are we all in the same\" bloat\"?. In Graphics interface, Vol. 2000. 187--196.","journal-title":". In Graphics interface"},{"key":"e_1_3_2_2_27_1","volume-title":"Upgrade to Windows 10: FAQ. https:\/\/support.microsoft.com\/en-us\/help\/12435\/window s-10-upgrade-faq. (July","year":"2016","unstructured":"Microsoft. 2016. Upgrade to Windows 10: FAQ. https:\/\/support.microsoft.com\/en-us\/help\/12435\/window s-10-upgrade-faq. (July 2016 ). ( Accessed on August 2, 2016). Microsoft. 2016. Upgrade to Windows 10: FAQ. https:\/\/support.microsoft.com\/en-us\/help\/12435\/window s-10-upgrade-faq. (July 2016). (Accessed on August 2, 2016)."},{"key":"e_1_3_2_2_28_1","volume-title":"Proc. of the 3rd Intl. Workshop on Research in the Large. Held in Conjunction with Mobile HCI. Citeseer, 3--6.","author":"M\u00f6ller Andreas","year":"2012","unstructured":"Andreas M\u00f6ller , Florian Michahelles , Stefan Diewald , Luis Roalter , and Matthias Kranz . 2012 . Update behavior in app markets and security implications: A case study in google play . In Proc. of the 3rd Intl. Workshop on Research in the Large. Held in Conjunction with Mobile HCI. Citeseer, 3--6. Andreas M\u00f6ller, Florian Michahelles, Stefan Diewald, Luis Roalter, and Matthias Kranz. 2012. Update behavior in app markets and security implications: A case study in google play. In Proc. of the 3rd Intl. Workshop on Research in the Large. Held in Conjunction with Mobile HCI. Citeseer, 3--6."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/317456.317459"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.48"},{"key":"e_1_3_2_2_31_1","volume-title":"10 Heuristics for User Interface Design. https: \/\/www.nngroup.com\/articles\/ten-usability-heuristics\/. (Jan","author":"Nielsen Jakob","year":"1995","unstructured":"Jakob Nielsen . 1995. 10 Heuristics for User Interface Design. https: \/\/www.nngroup.com\/articles\/ten-usability-heuristics\/. (Jan . 1995 ). ( Accessed on August 12, 2016). Jakob Nielsen. 1995. 10 Heuristics for User Interface Design. https: \/\/www.nngroup.com\/articles\/ten-usability-heuristics\/. (Jan. 1995). (Accessed on August 12, 2016)."},{"key":"e_1_3_2_2_32_1","volume-title":"Some observations on mental models. Mental models 7, 112","author":"Norman Donald A","year":"1983","unstructured":"Donald A Norman . 1983. Some observations on mental models. Mental models 7, 112 ( 1983 ), 7--14. Donald A Norman. 1983. Some observations on mental models. Mental models 7, 112 (1983), 7--14."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1511\/2001.4.344"},{"key":"e_1_3_2_2_34_1","volume-title":"The circumplex model of affect: An integrative approach to affective neuroscience, cognitive development, and psychopathology. Development and psychopathology 17, 03","author":"Posner Jonathan","year":"2005","unstructured":"Jonathan Posner , James A Russell , and Bradley S Peterson . 2005. The circumplex model of affect: An integrative approach to affective neuroscience, cognitive development, and psychopathology. Development and psychopathology 17, 03 ( 2005 ), 715--734. Jonathan Posner, James A Russell, and Bradley S Peterson. 2005. The circumplex model of affect: An integrative approach to affective neuroscience, cognitive development, and psychopathology. Development and psychopathology 17, 03 (2005), 715--734."},{"key":"e_1_3_2_2_35_1","unstructured":"John Siracusa. 2014. OS X 10.10 Yosemite: The Ars Technica Review | Ars Technica. http:\/\/arstechnica.co m\/apple\/2014\/10\/os-x-10--10\/9\/#spotlight. (Oct. 2014). (Accessed on August 1 2016).  John Siracusa. 2014. OS X 10.10 Yosemite: The Ars Technica Review | Ars Technica. http:\/\/arstechnica.co m\/apple\/2014\/10\/os-x-10--10\/9\/#spotlight. (Oct. 2014). (Accessed on August 1 2016)."},{"key":"e_1_3_2_2_36_1","unstructured":"Ashkan Soltani and Craig Timberg. 2014. Apple's Mac computers can automatically collect your location information - The Washington Post. https:\/\/www.washingtonpost.com\/news\/the-switch\/wp \/2014\/10\/20\/apples-mac-computers-can-automatically-c ollect-your-location-information\/. (Oct. 2014). (Accessed on August 1 2016).  Ashkan Soltani and Craig Timberg. 2014. Apple's Mac computers can automatically collect your location information - The Washington Post. https:\/\/www.washingtonpost.com\/news\/the-switch\/wp \/2014\/10\/20\/apples-mac-computers-can-automatically-c ollect-your-location-information\/. (Oct. 2014). (Accessed on August 1 2016)."},{"key":"e_1_3_2_2_37_1","volume-title":"System Sciences, 2009. HICSS'09. 42nd Hawaii International Conference on. IEEE, 1--9.","author":"T\u00e9tard Franck","year":"2009","unstructured":"Franck T\u00e9tard and Mikael Collan . 2009 . Lazy user theory: A dynamic model to understand user selection of products and services . In System Sciences, 2009. HICSS'09. 42nd Hawaii International Conference on. IEEE, 1--9. Franck T\u00e9tard and Mikael Collan. 2009. Lazy user theory: A dynamic model to understand user selection of products and services. In System Sciences, 2009. HICSS'09. 42nd Hawaii International Conference on. IEEE, 1--9."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808117.2808124"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858303"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557275"},{"key":"e_1_3_2_2_41_1","unstructured":"Rick Wash Emilee J Rader Kami Vaniea and Michelle Rizor. 2014. Out of the Loop: How Automated Software Updates Cause Unintended Security Consequences.. In SOUPS. 89--104.  Rick Wash Emilee J Rader Kami Vaniea and Michelle Rizor. 2014. Out of the Loop: How Automated Software Updates Cause Unintended Security Consequences.. In SOUPS. 89--104."},{"key":"e_1_3_2_2_42_1","unstructured":"Lance Whitney. 2016. Microsoft's Windows 10 upgrades are getting even more sneaky-pushy - CNET. http:\/\/www.cnet.com\/news\/microsoft-windows-10-upgrade s-get-more-sneaky-pushy\/. (May 2016). (Accessed on August 1 2016).  Lance Whitney. 2016. Microsoft's Windows 10 upgrades are getting even more sneaky-pushy - CNET. http:\/\/www.cnet.com\/news\/microsoft-windows-10-upgrade s-get-more-sneaky-pushy\/. (May 2016). (Accessed on August 1 2016)."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.0963-7214.2005.00355.x"}],"event":{"name":"CHI '17: CHI Conference on Human Factors in Computing Systems","location":"Denver Colorado USA","acronym":"CHI '17","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3025453.3025509","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3025453.3025509","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:22Z","timestamp":1750218622000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3025453.3025509"}},"subtitle":["A Field Study of How Users Experience Operating System Upgrades"],"short-title":[],"issued":{"date-parts":[[2017,5,2]]},"references-count":42,"alternative-id":["10.1145\/3025453.3025509","10.1145\/3025453"],"URL":"https:\/\/doi.org\/10.1145\/3025453.3025509","relation":{},"subject":[],"published":{"date-parts":[[2017,5,2]]},"assertion":[{"value":"2017-05-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}