{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T05:54:47Z","timestamp":1751608487016,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":64,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T00:00:00Z","timestamp":1601856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,5]]},"DOI":"10.1145\/3320269.3384761","type":"proceedings-article","created":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T16:33:23Z","timestamp":1601915603000},"page":"248-262","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["What risk? I don't understand. An Empirical Study on Users' Understanding of the Terms Used in Security Texts"],"prefix":"10.1145","author":[{"given":"Tingmin","family":"Wu","sequence":"first","affiliation":[{"name":"Swinburne University of Technology &amp; CSIRO's Data61, Melbourne, Australia"}]},{"given":"Rongjunchen","family":"Zhang","sequence":"additional","affiliation":[{"name":"Swinburne University of Technology &amp; CSIRO's Data61, Melbourne, Australia"}]},{"given":"Wanlun","family":"Ma","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"given":"Sheng","family":"Wen","sequence":"additional","affiliation":[{"name":"Swinburne University of Technology, Melbourne, Australia"}]},{"given":"Xin","family":"Xia","sequence":"additional","affiliation":[{"name":"Monash University, Melbourne, Australia"}]},{"given":"Cecile","family":"Paris","sequence":"additional","affiliation":[{"name":"CSIRO's Data61, Sydney, Australia"}]},{"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[{"name":"CSIRO's Data61, Sydney, Australia"}]},{"given":"Yang","family":"Xiang","sequence":"additional","affiliation":[{"name":"Swinburne University of Technology, Melbourne, Australia"}]}],"member":"320","published-online":{"date-parts":[[2020,10,5]]},"reference":[{"volume-title":"SecDev'16","author":"Acar Yasemin","key":"e_1_3_2_2_1_1"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3054926"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702322"},{"volume-title":"cited","year":"2019","key":"e_1_3_2_2_4_1"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.12.018"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.02.065"},{"volume-title":"Cyber security awareness campaigns: Why do they fail to change behaviour? arXiv preprint arXiv:1901.02672","year":"2019","author":"Bada Maria","key":"e_1_3_2_2_7_1"},{"volume-title":"VT-Revolution: Interactive Programming Video Tutorial Authoring and Watching System","year":"2018","author":"Bao Lingfeng","key":"e_1_3_2_2_8_1"},{"key":"e_1_3_2_2_9_1","first-page":"993","article-title":"Latent dirichlet allocation","author":"Blei David M","year":"2003","journal-title":"Journal of machine Learning research 3"},{"volume-title":"cited","year":"2019","author":"Pew Research Center","key":"e_1_3_2_2_10_1"},{"volume-title":"cited","year":"2019","author":"Netwrix Corporation","key":"e_1_3_2_2_11_1"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-4003"},{"key":"e_1_3_2_2_13_1","unstructured":"Lorrie F Cranor. 2008. A framework for reasoning about the human in the loop. (2008).  Lorrie F Cranor. 2008. A framework for reasoning about the human in the loop. (2008)."},{"key":"e_1_3_2_2_14_1","unstructured":"David M Diez Christopher D Barr and Mine Cetinkaya-Rundel. 2012. OpenIntro statistics. OpenIntro.  David M Diez Christopher D Barr and Mine Cetinkaya-Rundel. 2012. OpenIntro statistics. OpenIntro."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1600176.1600182"},{"volume-title":"First Steps Toward Measuring the Readability of Security Advice. In Workshop on Technology and Consumer Protection.","author":"Rock Stevens Everest Liu Lisa Maszkiewicz","key":"e_1_3_2_2_16_1"},{"volume-title":"SOUPS'16","year":"2016","author":"Fagan Michael","key":"e_1_3_2_2_17_1"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702442"},{"volume-title":"Terminology Extraction for Academic Slovene Using Sketch Engine. RASLAN 2016 Recent Advances in Slavonic Natural Language Processing","year":"2016","author":"Fier Darja","key":"e_1_3_2_2_19_1"},{"volume-title":"LISA'14","year":"2014","author":"Flor\u00eancio Dinei","key":"e_1_3_2_2_20_1"},{"volume-title":"SOUPS'16","year":"2016","author":"Forget Alain","key":"e_1_3_2_2_21_1"},{"volume-title":"cited","year":"2019","key":"e_1_3_2_2_22_1"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"crossref","unstructured":"Brij Gupta Dharma P Agrawal and Shingo Yamaguchi. 2016. Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global.  Brij Gupta Dharma P Agrawal and Shingo Yamaguchi. 2016. Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global.","DOI":"10.4018\/978-1-5225-0105-3"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1111\/joms.12120"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2556978"},{"volume-title":"LOTKS'17","year":"2017","author":"H\u00e4tty Anna","key":"e_1_3_2_2_26_1"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.23"},{"volume-title":"cited","year":"2019","key":"e_1_3_2_2_28_1"},{"key":"e_1_3_2_2_29_1","volume-title":"SOUPS'15","volume":"15","author":"Ion Iulia","year":"2015"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.179"},{"key":"e_1_3_2_2_31_1","unstructured":"Katharina Krombholz Wilfried Mayer Martin Schmiedecker and Edgar Weippl. 2017. \" I Have No Idea What I'm Doing\"-On the Usability of Deploying {HTTPS}. In USENIX Security'17. 1339--1356.  Katharina Krombholz Wilfried Mayer Martin Schmiedecker and Edgar Weippl. 2017. \" I Have No Idea What I'm Doing\"-On the Usability of Deploying {HTTPS}. In USENIX Security'17. 1339--1356."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978315"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-5010"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P18-4014"},{"key":"e_1_3_2_2_35_1","unstructured":"Susan E McGregor Polina Charters Tobin Holliday and Franziska Roesner. 2015. Investigating the computer security practices and needs of journalists. In USENIX Security'15. 399--414.  Susan E McGregor Polina Charters Tobin Holliday and Franziska Roesner. 2015. Investigating the computer security practices and needs of journalists. In USENIX Security'15. 399--414."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2013.106"},{"volume-title":"cited","year":"2019","key":"e_1_3_2_2_37_1"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134082"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.249"},{"volume-title":"Reputation as a sufficient condition for data quality on Amazon Mechanical Turk. Behavior research methods 46, 4","year":"2014","author":"Peer Eyal","key":"e_1_3_2_2_40_1"},{"volume-title":"CLEF","year":"2004","author":"Peters Carol","key":"e_1_3_2_2_41_1"},{"key":"e_1_3_2_2_42_1","first-page":"121","article-title":"Identifying patterns in informal sources of security information","volume":"1","author":"Rader Emilee","year":"2015","journal-title":"Journal of Cybersecurity"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.3115\/1117729.1117730"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978307"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.24"},{"volume-title":"Proceedings of the LREC 2010 Workshop on New Challenges for NLP Frameworks. ELRA, Valletta, Malta, 45--50","year":"2010","author":"Rehurek Radim","key":"e_1_3_2_2_46_1"},{"volume-title":"cited","year":"2019","author":"Force\u00ae Research IBM","key":"e_1_3_2_2_47_1"},{"volume-title":"cited","year":"2019","author":"Richardson Leonard","key":"e_1_3_2_2_48_1"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2684822.2685324"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2047594.2047628"},{"volume-title":"SOUPS'17","year":"2017","author":"Ruoti Scott","key":"e_1_3_2_2_51_1"},{"volume-title":"Geoffrey Ellis, and Daniel A Keim.","year":"2016","author":"Sacha Dominik","key":"e_1_3_2_2_52_1"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025926"},{"volume-title":"SOUPS'15","year":"2015","author":"Schaub Florian","key":"e_1_3_2_2_54_1"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557330"},{"key":"e_1_3_2_2_56_1","unstructured":"Donna Spencer. 2009. Card sorting: Designing usable categories. Rosenfeld Media.  Donna Spencer. 2009. Card sorting: Designing usable categories. Rosenfeld Media."},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858546"},{"volume-title":"SOUPS'15","year":"2015","author":"Ur Blase","key":"e_1_3_2_2_58_1"},{"volume-title":"cited","year":"2019","author":"Vasileva Olga","key":"e_1_3_2_2_59_1"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837125"},{"volume-title":"SOUPS'15","year":"2015","author":"Wash Rick","key":"e_1_3_2_2_61_1"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2639339"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813669"},{"volume-title":"SOUPS'18","year":"2018","author":"Zou Yixin","key":"e_1_3_2_2_64_1"}],"event":{"name":"ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"ASIA CCS '20"},"container-title":["Proceedings of the 15th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3384761","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3320269.3384761","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:28Z","timestamp":1750200088000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3384761"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,5]]},"references-count":64,"alternative-id":["10.1145\/3320269.3384761","10.1145\/3320269"],"URL":"https:\/\/doi.org\/10.1145\/3320269.3384761","relation":{},"subject":[],"published":{"date-parts":[[2020,10,5]]},"assertion":[{"value":"2020-10-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}