{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T10:24:52Z","timestamp":1750501492375,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":76,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,5]],"date-time":"2018-12-05T00:00:00Z","timestamp":1543968000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"DFG"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,5]]},"DOI":"10.1145\/3167996.3167999","type":"proceedings-article","created":{"date-parts":[[2019,1,9]],"date-time":"2019-01-09T18:42:31Z","timestamp":1547059351000},"page":"53-63","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["FoxIT"],"prefix":"10.1145","author":[{"given":"Nina","family":"Gerber","sequence":"first","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt"}]},{"given":"Paul","family":"Gerber","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt"}]},{"given":"Hannah","family":"Drews","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt"}]},{"given":"Elisa","family":"Kirchner","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt"}]},{"given":"Noah","family":"Schlegel","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt"}]},{"given":"Tim","family":"Schmidt","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt"}]},{"given":"Lena","family":"Scholz","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt"}]}],"member":"320","published-online":{"date-parts":[[2018,12,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"{n. d.}. Badgeville: Game mechanics (http:\/\/badgeville.com\/wiki\/Game_Mechanics). ({n. d.}).  {n. d.}. Badgeville: Game mechanics (http:\/\/badgeville.com\/wiki\/Game_Mechanics). ({n. d.})."},{"key":"e_1_3_2_1_2_1","unstructured":"2010. What they know- Mobile (http:\/\/blogs.wsj.com\/wtk-mobile\/). (2010).  2010. What they know- Mobile (http:\/\/blogs.wsj.com\/wtk-mobile\/). (2010)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/336992.336995"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_3"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2646584.2646585"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464460"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702210"},{"key":"e_1_3_2_1_8_1","unstructured":"Don Alsafi Julia Bernd Serge Egelman Gerald Friedland Dan Garcia Lara McConnaughey Irwin Reyes and Ketrina Yim. {n. d.}. Teaching Privacy (https:\/\/dhttp:\/\/www.teachingprivacy.org). ({n. d.}).  Don Alsafi Julia Bernd Serge Egelman Gerald Friedland Dan Garcia Lara McConnaughey Irwin Reyes and Ketrina Yim. {n. d.}. Teaching Privacy (https:\/\/dhttp:\/\/www.teachingprivacy.org). ({n. d.})."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.05.006"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.70"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501616"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2014.23006"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808117.2808119"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866317"},{"key":"e_1_3_2_1_15_1","unstructured":"BreakAwayGames. 2013. Vital Signs. (2013). http:\/\/www.breakawaygames.com\/vitalsigns\/  BreakAwayGames. 2013. Vital Signs. (2013). http:\/\/www.breakawaygames.com\/vitalsigns\/"},{"key":"e_1_3_2_1_16_1","unstructured":"BreakAwayGames. 2015. Virtual Dental Implant Trainer. (2015). http:\/\/www.breakawaygames.com\/  BreakAwayGames. 2015. Virtual Dental Implant Trainer. (2015). http:\/\/www.breakawaygames.com\/"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40477-1_5"},{"key":"e_1_3_2_1_18_1","unstructured":"ChronicLogic. 2006. Bridge Builder. (2006). http:\/\/www.bridgebuilder-game.com\/  ChronicLogic. 2006. Bridge Builder. (2006). http:\/\/www.bridgebuilder-game.com\/"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664266"},{"volume-title":"Privacy and Identity Management for Life, Michele Bezzi, Penny Duquenoy, Simone Fischer-H\u00fcbner","author":"Deuker Andr\u00e9","key":"e_1_3_2_1_20_1","unstructured":"Andr\u00e9 Deuker . 2010. Addressing the Privacy Paradox by Expanded Privacy Awareness - The Example of Context-Aware Services . In Privacy and Identity Management for Life, Michele Bezzi, Penny Duquenoy, Simone Fischer-H\u00fcbner , Ge Zhang, and Marit Hansen (Eds.). Springer , 275--283. Andr\u00e9 Deuker. 2010. Addressing the Privacy Paradox by Expanded Privacy Awareness - The Example of Context-Aware Services. In Privacy and Identity Management for Life, Michele Bezzi, Penny Duquenoy, Simone Fischer-H\u00fcbner, Ge Zhang, and Marit Hansen (Eds.). Springer, 275--283."},{"key":"e_1_3_2_1_21_1","volume-title":"https:\/\/developer.android.com\/guide\/topics\/permissions\/requesting.html#normal-dangerous","author":"Developers Android","year":"2017","unstructured":"Android Developers . 2017. Requesting Permissions . ( 2017 ). https:\/\/developer.android.com\/guide\/topics\/permissions\/requesting.html#normal-dangerous Android Developers. 2017. Requesting Permissions. (2017). https:\/\/developer.android.com\/guide\/topics\/permissions\/requesting.html#normal-dangerous"},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (OSDI'10)","author":"Enck William","year":"2010","unstructured":"William Enck , Peter Gilbert , Byung-Gon Chun , Landon P Cox , Jaeyeon Jung , Patrick McDaniel , and Anmol N Sheth . 2010 . TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones . In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (OSDI'10) . USENIX Association, Berkeley, CA, USA, 393--407. http:\/\/dl.acm.org\/citation.cfm?id= 1924943.1924971 William Enck, Peter Gilbert, Byung-Gon Chun, Landon P Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N Sheth. 2010. TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (OSDI'10). USENIX Association, Berkeley, CA, USA, 393--407. http:\/\/dl.acm.org\/citation.cfm?id=1924943.1924971"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"volume-title":"Presented as part of the 7th USENIX Workshop on Hot Topics in Security","author":"Felt Adrienne Porter","key":"e_1_3_2_1_24_1","unstructured":"Adrienne Porter Felt , Serge Egelman , Matthew Finifter , Devdatta Akhawe , and David Wagner . 2012. How to Ask for Permission . In Presented as part of the 7th USENIX Workshop on Hot Topics in Security . USENIX , Bellevue, WA . https:\/\/www.usenix.org\/conference\/hotsec12\/workshop-program\/presentation\/Felt Adrienne Porter Felt, Serge Egelman, Matthew Finifter, Devdatta Akhawe, and David Wagner. 2012. How to Ask for Permission. In Presented as part of the 7th USENIX Workshop on Hot Topics in Security. USENIX, Bellevue, WA. https:\/\/www.usenix.org\/conference\/hotsec12\/workshop-program\/presentation\/Felt"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381943"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1177\/097324700800400401"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381945"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2014.23044"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/950566.950595"},{"key":"e_1_3_2_1_31_1","volume-title":"The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions. Journal of Information Security and Applications (nov","author":"Gerber Paul","year":"2016","unstructured":"Paul Gerber , Melanie Volkamer , and Karen Renaud . 2016. The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions. Journal of Information Security and Applications (nov 2016 ). Paul Gerber, Melanie Volkamer, and Karen Renaud. 2016. The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions. Journal of Information Security and Applications (nov 2016)."},{"key":"e_1_3_2_1_32_1","unstructured":"Google. {n. d.}. System permissions (https:\/\/developer.android.com\/guide\/topics\/permissions\/requesting.html#normal-dangerous). ({n. d.}).  Google. {n. d.}. System permissions (https:\/\/developer.android.com\/guide\/topics\/permissions\/requesting.html#normal-dangerous). ({n. d.})."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2556978"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046780"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2014.23045"},{"key":"e_1_3_2_1_36_1","volume-title":"Symposium on Usable Privacy and Security (SOUPS). 39--52","author":"Kang Ruogu","year":"2015","unstructured":"Ruogu Kang , Laura Dabbish , Nathaniel Fruchter , and Sara Kiesler . 2015 . \" My data just goes everywhere:\" user mental models of the internet and implications for privacy and security . In Symposium on Usable Privacy and Security (SOUPS). 39--52 . Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. \"My data just goes everywhere:\" user mental models of the internet and implications for privacy and security. In Symposium on Usable Privacy and Security (SOUPS). 39--52."},{"key":"e_1_3_2_1_37_1","volume-title":"Intelligent Systems Control and Automation. Science and Engineering 37","author":"Kankaanranta M","year":"2009","unstructured":"M Kankaanranta and P Neittaanm\u00e4ki . 2009. Design and Use of Serious Games , Intelligent Systems Control and Automation. Science and Engineering 37 ( 2009 ). M Kankaanranta and P Neittaanm\u00e4ki. 2009. Design and Use of Serious Games, Intelligent Systems Control and Automation. Science and Engineering 37 (2009)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34638-5_6"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466466"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.3151331"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/STAST.2014.15"},{"key":"e_1_3_2_1_42_1","volume-title":"Design and Implement a Computer Network Security Education Game on iOS for University Students. Applied Mechanics and Materials 373--375","author":"Liang Hui","year":"2013","unstructured":"Hui Liang and Min Yong Shi . 2013. Design and Implement a Computer Network Security Education Game on iOS for University Students. Applied Mechanics and Materials 373--375 ( 2013 ), 1815--1820. Hui Liang and Min Yong Shi. 2013. Design and Implement a Computer Network Security Education Game on iOS for University Students. Applied Mechanics and Materials 373--375 (2013), 1815--1820."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v5i2.630"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.4108\/icst.mobiquitous.2014.258066"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370290"},{"key":"e_1_3_2_1_46_1","volume-title":"Symposium on Usable Privacy and Security (SOUPS)","volume":"40","author":"Lin Jialiu","unstructured":"Jialiu Lin , Bin Liu , Norman Sadeh , and Jason I. Hong . 2014. Modeling users' mobile app privacy preferences: Restoring usability in a sea of permission settings . In Symposium on Usable Privacy and Security (SOUPS) , Vol. 40 . 199--212. Jialiu Lin, Bin Liu, Norman Sadeh, and Jason I. Hong. 2014. Modeling users' mobile app privacy preferences: Restoring usability in a sea of permission settings. In Symposium on Usable Privacy and Security (SOUPS), Vol. 40. 199--212."},{"key":"e_1_3_2_1_47_1","volume-title":"Symposium on Usable Privacy and Security. 27--41","author":"Liu Bin","year":"2016","unstructured":"Bin Liu , Mads Schaarup Andersen , Florian Schaub , Hazim Almuhimedi , S A Zhang , Norman Sadeh , Y Agarwal , and A Acquisti . 2016 . Follow my recommendations: A personalized privacy assistant for mobile app permissions . In Symposium on Usable Privacy and Security. 27--41 . Bin Liu, Mads Schaarup Andersen, Florian Schaub, Hazim Almuhimedi, S A Zhang, Norman Sadeh, Y Agarwal, and A Acquisti. 2016. Follow my recommendations: A personalized privacy assistant for mobile app permissions. In Symposium on Usable Privacy and Security. 27--41."},{"key":"e_1_3_2_1_48_1","volume-title":"Public Perceptions of Privacy and Security in the Post-Snowden Era","author":"Madden Mary","year":"2014","unstructured":"Mary Madden , Lee Rainie , Kathryn Zickuhr , Maeve Duggan , and Aaron Smith . 2014. Public Perceptions of Privacy and Security in the Post-Snowden Era . Pew Research Center ( 2014 ), 3--57. https:\/\/doi.org\/202.419.4372 Mary Madden, Lee Rainie, Kathryn Zickuhr, Maeve Duggan, and Aaron Smith. 2014. Public Perceptions of Privacy and Security in the Post-Snowden Era. Pew Research Center (2014), 3--57. https:\/\/doi.org\/202.419.4372"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517868"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"e_1_3_2_1_51_1","unstructured":"Microsoft. 2012. Visual Studio Achievements Program. (2012). https:\/\/blogs.technet.microsoft.com\/microsoft  Microsoft. 2012. Visual Studio Achievements Program. (2012). https:\/\/blogs.technet.microsoft.com\/microsoft"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2004.tb00865.x"},{"key":"e_1_3_2_1_53_1","unstructured":"Curtiss Murphy. 2012. Why Games Work and the Science of Learning. In Selected Papers Presented at MODSIM World 2011 Conference and Expo. 383--392.  Curtiss Murphy. 2012. Why Games Work and the Science of Learning. In Selected Papers Presented at MODSIM World 2011 Conference and Expo. 383--392."},{"volume-title":"https:\/\/www.nintendo.com\/games\/detail\/r1QM8ZnIi2Gku-gAVPoAq3Rc-iL0t4hM","year":"2010","key":"e_1_3_2_1_54_1","unstructured":"Nintendo. 2010. Fluidity. ( 2010 ). https:\/\/www.nintendo.com\/games\/detail\/r1QM8ZnIi2Gku-gAVPoAq3Rc-iL0t4hM Nintendo. 2010. Fluidity. (2010). https:\/\/www.nintendo.com\/games\/detail\/r1QM8ZnIi2Gku-gAVPoAq3Rc-iL0t4hM"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2006.00070.x"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.05.041"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2015.23008"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.14722\/eurousec.2016.23010"},{"key":"e_1_3_2_1_59_1","volume-title":"Privacy Awareness: A Means to Solve the Privacy Paradox? In The Future of Identity in the","author":"P\u00f6tzsch Stefanie","year":"2009","unstructured":"Stefanie P\u00f6tzsch . 2009 . Privacy Awareness: A Means to Solve the Privacy Paradox? In The Future of Identity in the Information Society, V. Maty\u00e1\u0161, S. Fischer-H\u00fcbner, D. Cvr\u010dek, and P. \u0160venda (Eds.). Vol. 298 . Springer , Berlin, Heidelberg, 226--236. Stefanie P\u00f6tzsch. 2009. Privacy Awareness: A Means to Solve the Privacy Paradox? In The Future of Identity in the Information Society, V. Maty\u00e1\u0161, S. Fischer-H\u00fcbner, D. Cvr\u010dek, and P. \u0160venda (Eds.). Vol. 298. Springer, Berlin, Heidelberg, 226--236."},{"key":"e_1_3_2_1_60_1","volume-title":"Pew Research Center","author":"Rainie Lee","year":"2013","unstructured":"Lee Rainie , Sara Kiesler , Ruogu Kang , and Mary Madden . 2013. Anonymity, Privacy, and Security Online . Pew Research Center ( 2013 ), 1--35. http:\/\/www.pewinternet.org\/Reports\/2013\/Anonymity-online.aspx Lee Rainie, Sara Kiesler, Ruogu Kang, and Mary Madden. 2013. Anonymity, Privacy, and Security Online. Pew Research Center (2013), 1--35. http:\/\/www.pewinternet.org\/Reports\/2013\/Anonymity-online.aspx"},{"key":"e_1_3_2_1_61_1","unstructured":"Andreas Josef Rieb Marko Hofmann Alexander Laux Steffi Rudel and Ulrike Lechner. 2017. Wie IT-Security Matchplays als Awarenessma\u00dfnahme die IT-Sicherheit verbessern k\u00f6nnen. (2017).  Andreas Josef Rieb Marko Hofmann Alexander Laux Steffi Rudel and Ulrike Lechner. 2017. Wie IT-Security Matchplays als Awarenessma\u00dfnahme die IT-Sicherheit verbessern k\u00f6nnen. (2017)."},{"key":"e_1_3_2_1_62_1","volume-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS","author":"Schaub Florian","year":"2015","unstructured":"Florian Schaub , Rebecca Balebako , Adam L Durity , and Lorrie Faith Cranor . 2015 . A design space for effective privacy notices . In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). USENIX Association, 1--17. Florian Schaub, Rebecca Balebako, Adam L Durity, and Lorrie Faith Cranor. 2015. A design space for effective privacy notices. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). USENIX Association, 1--17."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2016.23017"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702404"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557421"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33630-5_10"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557400"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2978192.2978229"},{"key":"e_1_3_2_1_70_1","first-page":"1","article-title":"Curbing android permission creep","volume":"2","author":"Vidas Timothy","year":"2011","unstructured":"Timothy Vidas , Nicolas Christin , and Lorrie Cranor . 2011 . Curbing android permission creep . In Proceedings of the Web , Vol. 2. 1 -- 5 . Timothy Vidas, Nicolas Christin, and Lorrie Cranor. 2011. Curbing android permission creep. In Proceedings of the Web, Vol. 2. 1--5.","journal-title":"Proceedings of the Web"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785845"},{"key":"e_1_3_2_1_72_1","volume-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS","author":"Watanabe Takuya","year":"2015","unstructured":"Takuya Watanabe , Mitsuaki Akiyama , Tetsuya Sakai , Hironori Washizaki , and Tatsuya Mori . 2015 . Understanding the inconsistencies between text descriptions and the use of privacy-sensitive resources of mobile apps . In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). USENIX Association, 241--255. Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, Hironori Washizaki, and Tatsuya Mori. 2015. Understanding the inconsistencies between text descriptions and the use of privacy-sensitive resources of mobile apps. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). USENIX Association, 241--255."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2016.09.006"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2012.06.003"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2820073"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.5555\/2022245.2022255"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.297"}],"event":{"name":"STAST2017: 7th International Workshop on Socio-Technical Aspects in Security and Trust","acronym":"STAST2017","location":"Orlando Florida USA"},"container-title":["Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3167996.3167999","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3167996.3167999","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:07Z","timestamp":1750213567000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3167996.3167999"}},"subtitle":["enhancing mobile users' privacy behavior by increasing knowledge and awareness"],"short-title":[],"issued":{"date-parts":[[2018,12,5]]},"references-count":76,"alternative-id":["10.1145\/3167996.3167999","10.1145\/3167996"],"URL":"https:\/\/doi.org\/10.1145\/3167996.3167999","relation":{},"subject":[],"published":{"date-parts":[[2018,12,5]]},"assertion":[{"value":"2018-12-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}