{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T20:11:09Z","timestamp":1762459869979,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,2]],"date-time":"2020-04-02T00:00:00Z","timestamp":1585785600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,2]]},"DOI":"10.1145\/3374135.3385314","type":"proceedings-article","created":{"date-parts":[[2020,5,26]],"date-time":"2020-05-26T00:12:43Z","timestamp":1590451963000},"page":"260-263","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Do You See the Warning?"],"prefix":"10.1145","author":[{"given":"Nisheeth","family":"Agrawal","sequence":"first","affiliation":[{"name":"Computer Science and Information Technology, Athens, AL, USA and Computer Science, University of Alabama Huntsville, Huntsville, AL, USA"}]},{"given":"Feng","family":"Zhu","sequence":"additional","affiliation":[{"name":"Computer Science, University of Alabama Huntsville, Huntsville, AL, USA"}]},{"given":"Sandra","family":"Carpenter","sequence":"additional","affiliation":[{"name":"Psychology University of Alabama Huntsville, Huntsville, AL, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,5,25]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"26","article-title":"2005","author":"Acquisti A.","year":"2005","unstructured":"A. Acquisti and J. Grossklags, 2005. Privacy and Rationality in Individual Decision Making. IEEE Security & Privacy. January\/February 2005, 26--33.","journal-title":"Privacy and Rationality in Individual Decision Making. IEEE Security & Privacy."},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 22nd USENIX Security Symposium, Washington D.C. USA","author":"Akhawe D.","year":"2013","unstructured":"D. Akhawe and A. Porter Felt. Alice in Warningland: A Large-scale Field Study of Browser Security Warning Effectiveness. In Proceedings of the 22nd USENIX Security Symposium, Washington D.C. USA (2013), 257--272."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature13314A"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.198"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23768-3_2"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0015329"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.concog.2013.04.011"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tics.2006.03.007"},{"key":"e_1_3_2_1_9_1","volume-title":"CHI 2008 Proceedings - Am I Safe, 1071","author":"Egelman S.","year":"2008","unstructured":"S. Egelman, L. F. Cranor, and J. Hong (Carnegie Mellon University). 2008. CHI 2008 Proceedings - Am I Safe, 1071. Florence, Italy."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-8141(96)00062-5"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03655-2_57"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CRISIS.2012.6378951"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1177\/1557234X0600200109"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1177\/154193128603000723"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781482289688"},{"key":"e_1_3_2_1_16_1","unstructured":"F. Zhu S. Carpenter and M. Zeng. 2019. Subliminal Privacy Warnings: Utilizing the High Bandwidth of Nonconscious Visual Perception. (submitted for publication)."}],"event":{"name":"ACM SE '20: 2020 ACM Southeast Conference","sponsor":["ACM Association for Computing Machinery"],"location":"Tampa FL USA","acronym":"ACM SE '20"},"container-title":["Proceedings of the 2020 ACM Southeast Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374135.3385314","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3374135.3385314","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:47Z","timestamp":1750200107000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374135.3385314"}},"subtitle":["Cybersecurity Warnings via Nonconscious Processing"],"short-title":[],"issued":{"date-parts":[[2020,4,2]]},"references-count":16,"alternative-id":["10.1145\/3374135.3385314","10.1145\/3374135"],"URL":"https:\/\/doi.org\/10.1145\/3374135.3385314","relation":{},"subject":[],"published":{"date-parts":[[2020,4,2]]},"assertion":[{"value":"2020-05-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}