{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T12:49:46Z","timestamp":1776084586811,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,12,5]],"date-time":"2016-12-05T00:00:00Z","timestamp":1480896000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/N033396\/1"],"award-info":[{"award-number":["EP\/N033396\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,12,5]]},"DOI":"10.1145\/3046055.3046058","type":"proceedings-article","created":{"date-parts":[[2017,9,13]],"date-time":"2017-09-13T16:20:10Z","timestamp":1505319610000},"page":"61-72","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Why do people use unsecure public wi-fi?"],"prefix":"10.1145","author":[{"given":"Nissy","family":"Sombatruang","sequence":"first","affiliation":[{"name":"University College London, London, UK"}]},{"given":"M. Angela","family":"Sasse","sequence":"additional","affiliation":[{"name":"University College London, London, UK"}]},{"given":"Michelle","family":"Baddeley","sequence":"additional","affiliation":[{"name":"University College London, London, UK"}]}],"member":"320","published-online":{"date-parts":[[2016,12,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.2307\/3146458"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.4"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Baddeley M. (2012). Behavioural economics and finance. London: Routledge.  Baddeley M. (2012). Behavioural economics and finance. London: Routledge.","DOI":"10.4324\/9780203104514"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/511399.511359"},{"key":"e_1_3_2_1_6_1","unstructured":"Briggs Rachael (2015) \"Normative Theories of Rational Choice: Expected Utility\" The Stanford Encyclopedia of Philosophy (Winter 2015 Edition) Edward N. Zalta (ed.).  Briggs Rachael (2015) \"Normative Theories of Rational Choice: Expected Utility\" The Stanford Encyclopedia of Philosophy (Winter 2015 Edition) Edward N. Zalta (ed.)."},{"issue":"2","key":"e_1_3_2_1_7_1","first-page":"27","article-title":"Wi-fi hotspots: secure or ripe for fraud","volume":"5","author":"Brody R. G.","year":"2013","journal-title":"Journal of Forensic Investigative Accounting"},{"key":"e_1_3_2_1_8_1","unstructured":"Bumble www.bumble.com\/en-us\/faq  Bumble www.bumble.com\/en-us\/faq"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Byrnes J. P. Miller D. C. & Schafer W. D. (1999). Gender differences in risk taking: A meta-analysis. Psychological bulletin 125(3) 367.  Byrnes J. P. Miller D. C. & Schafer W. D. (1999). Gender differences in risk taking: A meta-analysis. Psychological bulletin 125(3) 367.","DOI":"10.1037\/0033-2909.125.3.367"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jebo.2011.06.007"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.20"},{"key":"e_1_3_2_1_12_1","volume-title":"INFOCOM, 2013 Proceedings IEEE (pp. 2769--2777)","author":"Cheng N.","year":"2013"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1864349.1864398"},{"key":"e_1_3_2_1_14_1","unstructured":"Evening Standard (2015) www.standard.co.uk\/news\/crime\/cybercriminals-hack-into-free-wifi-hotspots-to-get-bank-details-a3151736.html  Evening Standard (2015) www.standard.co.uk\/news\/crime\/cybercriminals-hack-into-free-wifi-hotspots-to-get-bank-details-a3151736.html"},{"key":"e_1_3_2_1_15_1","unstructured":"F-Secure (2014) THE F-SECURE WI-FI EXPERIMENT www.fsecureconsumer.files.wordpress.com\/2014\/09\/wi-fi_report_2014_f-secure.pdf  F-Secure (2014) THE F-SECURE WI-FI EXPERIMENT www.fsecureconsumer.files.wordpress.com\/2014\/09\/wi-fi_report_2014_f-secure.pdf"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20376-8_29"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07620-1_27"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41098-7_9"},{"key":"e_1_3_2_1_19_1","first-page":"6","article-title":"Do strong web passwords accomplish anything","volume":"7","author":"Flor\u00eancio D.","year":"2007","journal-title":"HotSec"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444808096247"},{"issue":"1","key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1017\/S1930297500000346","article-title":"Gender differences in risk assessment: why do women take fewer risks than men?","volume":"1","author":"Harris C. R.","year":"2006","journal-title":"Judgment and Decision Making"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/STAST.2014.9"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307673"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1719030.1719050"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Kahneman D. & Tversky A. (1975) Judgment Under Uncertainty: Heuristics and Biases New York: Cambridge University Press.  Kahneman D. & Tversky A. (1975) Judgment Under Uncertainty: Heuristics and Biases New York: Cambridge University Press.","DOI":"10.1007\/978-94-010-1834-0_8"},{"key":"e_1_3_2_1_26_1","first-page":"101","article-title":"Whacking, Joyriding and War-Driving: Roaming Use of Wi-Fi and the Law","volume":"21","author":"Kern B. D.","year":"2004","journal-title":"Santa Clara Computer & High Tech. LJ"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.179"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1519004"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Lambert A. McQuire S. & Papastergiardis N. (2014). Public Wi-Fi. Australian Journal of Telecommunications and the Digital Economy 2(3).  Lambert A. McQuire S. & Papastergiardis N. (2014). Public Wi-Fi. Australian Journal of Telecommunications and the Digital Economy 2(3).","DOI":"10.7790\/ajtde.v2n3.45"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1600176.1600178"},{"key":"e_1_3_2_1_31_1","unstructured":"Market Watch (2015) www.marketwatch.com\/story\/how-dating-apps-are-getting-better-for-women-2015-08-12  Market Watch (2015) www.marketwatch.com\/story\/how-dating-apps-are-getting-better-for-women-2015-08-12"},{"issue":"3","key":"e_1_3_2_1_32_1","first-page":"257","article-title":"An expected utility-user's guide to expected utility experiments","volume":"19","author":"Neilson W. S.","year":"1993","journal-title":"Eastern Economic Journal"},{"key":"e_1_3_2_1_33_1","volume-title":"The Third International Conference on Digital Information Processing and Communications (pp. 704--713)","author":"Noor M. M.","year":"2013"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Powell A. & Shade L. R. (2006). Going Wi-Fi in Canada: municipal and community initiatives. Government Information Quarterly 23(3--4) 381--403.  Powell A. & Shade L. R. (2006). Going Wi-Fi in Canada: municipal and community initiatives. Government Information Quarterly 23(3--4) 381--403.","DOI":"10.1016\/j.giq.2006.09.001"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2674377.2674383"},{"key":"e_1_3_2_1_36_1","article-title":"The expected utility model: Its variants, purposes, evidence and limitations","author":"Schoemaker P. J.","year":"1982","journal-title":"Journal of economic literature, 529--563."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2013.07.02"},{"key":"e_1_3_2_1_38_1","volume-title":"IFIP International Conference on Trust Management (pp. 32--47)","author":"Swanson C.","year":"2010"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_22"},{"key":"e_1_3_2_1_40_1","unstructured":"Tech Crunch (2016) WhatsApp completes end-to-end encryption rollout www.techcrunch.com\/2016\/04\/05\/whatsapp-completes-end-to-end-encryption-rollout  Tech Crunch (2016) WhatsApp completes end-to-end encryption rollout www.techcrunch.com\/2016\/04\/05\/whatsapp-completes-end-to-end-encryption-rollout"},{"key":"e_1_3_2_1_41_1","unstructured":"Thaler R. H. (1997). Irving Fisher: modern behavioral economist. The American economic review 87(2) 439--441.  Thaler R. H. (1997). Irving Fisher: modern behavioral economist. The American economic review 87(2) 439--441."},{"key":"e_1_3_2_1_42_1","unstructured":"Thaler R. H. (2015). Misbehaving: The making of behavioral economics.  Thaler R. H. (2015). Misbehaving: The making of behavioral economics."},{"key":"e_1_3_2_1_43_1","unstructured":"The Register (2016) EU ends anonymity and rules open Wi-Fi hotspots need passwords www.theregister.co.uk\/2016\/09\/15\/eu_ends_anonymity_and _rules_open_wifi_hotspots_need_a_password  The Register (2016) EU ends anonymity and rules open Wi-Fi hotspots need passwords www.theregister.co.uk\/2016\/09\/15\/eu_ends_anonymity_and _rules_open_wifi_hotspots_need_a_password"},{"key":"e_1_3_2_1_44_1","unstructured":"Transport of London (2016) Station Wi-Fi www.tfl.gov.uk\/campaign\/station-wifi  Transport of London (2016) Station Wi-Fi www.tfl.gov.uk\/campaign\/station-wifi"},{"key":"e_1_3_2_1_45_1","unstructured":"Trip Wire (2015) How to Detect and Attack Evil Twin WiFi Access Points www.tripwire.com\/state-of-security\/security-data-protection\/detect-attack-evil-twin-wifi-access-points\/  Trip Wire (2015) How to Detect and Attack Evil Twin WiFi Access Points www.tripwire.com\/state-of-security\/security-data-protection\/detect-attack-evil-twin-wifi-access-points\/"},{"key":"e_1_3_2_1_46_1","unstructured":"Von Neumann J. O. Morgenstern (1944) Theory of games and economic behavior Princeton University Press Princeton NJ.  Von Neumann J. O. Morgenstern (1944) Theory of games and economic behavior Princeton University Press Princeton NJ."},{"key":"e_1_3_2_1_47_1","volume-title":"European Workshop on Performance Engineering (pp. 194--208)","author":"Yevseyeva I.","year":"2014"}],"event":{"name":"STAST '16: Socio-Technical Aspects in Security and Trust","location":"Los Angeles California","acronym":"STAST '16"},"container-title":["Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3046055.3046058","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3046055.3046058","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:24Z","timestamp":1750218624000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3046055.3046058"}},"subtitle":["an investigation of behaviour and factors driving decisions"],"short-title":[],"issued":{"date-parts":[[2016,12,5]]},"references-count":47,"alternative-id":["10.1145\/3046055.3046058","10.1145\/3046055"],"URL":"https:\/\/doi.org\/10.1145\/3046055.3046058","relation":{},"subject":[],"published":{"date-parts":[[2016,12,5]]},"assertion":[{"value":"2016-12-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}