{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T23:05:12Z","timestamp":1776121512280,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":68,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,27]],"date-time":"2020-06-27T00:00:00Z","timestamp":1593216000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"ERC","award":["678341"],"award-info":[{"award-number":["678341"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,27]]},"DOI":"10.1145\/3377811.3380387","type":"proceedings-article","created":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T18:25:38Z","timestamp":1601576738000},"page":"136-148","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["One size does not fit all"],"prefix":"10.1145","author":[{"given":"Anastasia","family":"Danilova","sequence":"first","affiliation":[{"name":"University of Bonn"}]},{"given":"Alena","family":"Naiakshina","sequence":"additional","affiliation":[{"name":"University of Bonn"}]},{"given":"Matthew","family":"Smith","sequence":"additional","affiliation":[{"name":"University of Bonn"}]}],"member":"320","published-online":{"date-parts":[[2020,10]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Amazon Mechanical Turk (MTurk). https:\/\/www.mturk.com\/ Accessed","year":"2019","unstructured":"[n.d.]. Amazon Mechanical Turk (MTurk). https:\/\/www.mturk.com\/ Accessed: August 2019."},{"key":"e_1_3_2_1_2_1","volume-title":"https:\/\/www.qualtrics.com Accessed","year":"2019","unstructured":"[n.d.]. Qualtrics. https:\/\/www.qualtrics.com Accessed: August 2019."},{"key":"e_1_3_2_1_3_1","volume-title":"https:\/\/www.xing.com\/ Accessed","author":"XING.","year":"2019","unstructured":"[n.d.]. XING. https:\/\/www.xing.com\/ Accessed: August 2019."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.52"},{"key":"e_1_3_2_1_5_1","volume-title":"You are not your developer, either: A research agenda for usable security and privacy research beyond end users. In 2016 IEEE Cybersecurity Development (SecDev)","author":"Acar Yasemin","unstructured":"Yasemin Acar, Sascha Fahl, and Michelle L Mazurek. 2016. You are not your developer, either: A research agenda for usable security and privacy research beyond end users. In 2016 IEEE Cybersecurity Development (SecDev). IEEE, 3--8."},{"key":"e_1_3_2_1_6_1","unstructured":"Devdatta Akhawe and Adrienne Porter Felt. 2013. Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness. In Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13). USENIX Washington D.C. 257--272. https:\/\/www.usenix.org\/conference\/usenixsecurity13\/technical-sessions\/presentation\/akhawe"},{"key":"e_1_3_2_1_7_1","volume-title":"10th Symposium On Usable Privacy and Security ({SOUPS}","author":"Almuhimedi Hazim","year":"2014","unstructured":"Hazim Almuhimedi, Adrienne Porter Felt, Robert W Reeder, and Sunny Consolvo. 2014. Your reputation precedes you: History, reputation, and the chrome malware warning. In 10th Symposium On Usable Privacy and Security ({SOUPS} 2014). 113--128."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2018.1505008"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300519"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Brian P Bailey Joseph A Konstan and John V Carlis. 2000. Measuring the effects of interruptions on task performance in the user interface. In Smc 2000 conference proceedings. 2000 ieee international conference on systems man and cybernetics.' cybernetics evolving to systems humans organizations and their complex interactions' (cat. no. 0 Vol. 2. IEEE 757--762.","DOI":"10.1109\/ICSMC.2000.885940"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236040"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.59"},{"key":"e_1_3_2_1_13_1","volume-title":"10th Symposium On Usable Privacy and Security (SOUPS 2014","author":"Bravo-Lillo Cristian","year":"2014","unstructured":"Cristian Bravo-Lillo, Lorrie Cranor, Saranga Komanduri, Stuart Schechter, and Manya Sleeper. 2014. Harder to Ignore? Revisiting Pop-Up Fatigue and Approaches to Prevent It. In 10th Symposium On Usable Privacy and Security (SOUPS 2014). USENIX Association, Menlo Park, CA, 105--111. https:\/\/www.usenix.org\/conference\/soups2014\/proceedings\/presentation\/bravo-lillo"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.198"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501610"},{"key":"e_1_3_2_1_16_1","volume-title":"The Sage handbook of grounded theory","author":"Bryant Antony","unstructured":"Antony Bryant and Kathy Charmaz. 2007. The Sage handbook of grounded theory. Sage."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2017.1314612"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1177\/0049124113500475"},{"key":"e_1_3_2_1_19_1","unstructured":"Kathy Charmaz. 2006. Constructing grounded theory: A practical guide through qualitative analysis. sage."},{"key":"e_1_3_2_1_20_1","volume-title":"Constructionism and the grounded theory method. Handbook of constructionist research 1","author":"Charmaz Kathy","year":"2008","unstructured":"Kathy Charmaz. 2008. Constructionism and the grounded theory method. Handbook of constructionist research 1 (2008), 397--412."},{"key":"e_1_3_2_1_21_1","unstructured":"Kathy Charmaz. 2014. Constructing grounded theory. sage."},{"key":"e_1_3_2_1_22_1","volume-title":"Five ways of doing qualitative analysis: Phenomenological psychology, grounded theory, discourse analysis, narrative research, and intuitive inquiry","author":"Charmaz Kathy","unstructured":"Kathy Charmaz and Linda M McMullen. 2011. Five ways of doing qualitative analysis: Phenomenological psychology, grounded theory, discourse analysis, narrative research, and intuitive inquiry. Guilford Press."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970347"},{"key":"e_1_3_2_1_24_1","volume-title":"A coefficient of agreement for nominal scales. Educational and psychological measurement 20, 1","author":"Cohen Jacob","year":"1960","unstructured":"Jacob Cohen. 1960. A coefficient of agreement for nominal scales. Educational and psychological measurement 20, 1 (1960), 37--46."},{"key":"e_1_3_2_1_25_1","unstructured":"Juliet Corbin Anselm Strauss and Anselm L Strauss. 2014. Basics of qualitative research. sage."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2648.1997.t01-25-00999.x"},{"key":"e_1_3_2_1_27_1","volume-title":"Warnings and risk communication","author":"DeJoy David M","unstructured":"David M DeJoy, Kenneth R Laughery, and Michael S Wogalter. 1999. Warnings and risk communication. Taylor & Francis."},{"key":"e_1_3_2_1_28_1","volume-title":"Croom Helm). Denzin The Research Act in Sociology 1970","author":"Denzin NK","year":"1970","unstructured":"NK Denzin. 1970. The Research Act in Sociology (London, Croom Helm). Denzin The Research Act in Sociology 1970 (1970)."},{"key":"e_1_3_2_1_29_1","volume-title":"The research act: A theoretical introduction to sociological methods","author":"Denzin Norman K","unstructured":"Norman K Denzin. 2017. The research act: A theoretical introduction to sociological methods. Routledge."},{"key":"e_1_3_2_1_30_1","volume-title":"Mail and Internet surveys: The tailored design method-2007 Update with new Internet, visual, and mixed-mode guide","author":"Dillman Don A","unstructured":"Don A Dillman. 2011. Mail and Internet surveys: The tailored design method-2007 Update with new Internet, visual, and mixed-mode guide. John Wiley & Sons."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357219"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382205"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702442"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381943"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_3_2_1_36_1","volume-title":"FindBugs - Find Bugs in Java Programs","unstructured":"FindBugs. 2018. FindBugs - Find Bugs in Java Programs. http:\/\/findbugs.sourceforge.net\/. Accessed: 28-01-19."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/2835434.2835437"},{"key":"e_1_3_2_1_38_1","volume-title":"Statistical methods for rates and proportions","author":"Fleiss Joseph L","unstructured":"Joseph L Fleiss, Bruce Levin, and Myunghee Cho Paik. 2013. Statistical methods for rates and proportions. John Wiley & Sons."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5590\/JOSC.2018.10.1.02"},{"key":"e_1_3_2_1_40_1","volume-title":"Discovery of grounded theory: Strategies for qualitative research","author":"Glaser Barney G","unstructured":"Barney G Glaser and Anselm L Strauss. 2017. Discovery of grounded theory: Strategies for qualitative research. Routledge."},{"key":"e_1_3_2_1_41_1","volume-title":"The discovery of grounded theory: strategies for qualitative research","author":"Glaser Barney G","year":"1967","unstructured":"G Glaser Barney and L Strauss Anselm. 1967. The discovery of grounded theory: strategies for qualitative research. New York, Adline de Gruyter (1967)."},{"key":"e_1_3_2_1_42_1","volume-title":"Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018","author":"Gorski Peter Leo","year":"2018","unstructured":"Peter Leo Gorski, Luigi Lo Iacono, Dominik Wermke, Christian Stransky, Sebastian M\u00f6ller, Yasemin Acar, and Sascha Fahl. 2018. Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). USENIX Association, Baltimore, MD, 265--281. https:\/\/www.usenix.org\/conference\/soups2018\/presentation\/gorski"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.111"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642657"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950304"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486877"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/3155562.3155681"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1111\/apps.12108"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134355"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"Manuel Mora Ovsei Gelman Annette Steenkamp and Mahesh S Raisinghani. 2012. Research methodologies innovations and philosophies in software systems engineering and information systems. IGI Global Hershey PA.","DOI":"10.4018\/978-1-46660-179-6"},{"key":"e_1_3_2_1_51_1","volume-title":"Focus groups. Annual review of sociology 22, 1","author":"Morgan David L","year":"1996","unstructured":"David L Morgan. 1996. Focus groups. Annual review of sociology 22, 1 (1996), 129--152."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300370"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134082"},{"key":"e_1_3_2_1_54_1","volume-title":"Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018","author":"Naiakshina Alena","year":"2018","unstructured":"Alena Naiakshina, Anastasia Danilova, Christian Tiefenau, and Matthew Smith. 2018. Deception Task Design in Developer Password Studies: Exploring a Student Sample. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). USENIX Association, Baltimore, MD, 297--313. https:\/\/www.usenix.org\/conference\/soups2018\/presentation\/naiakshina"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133977"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1093\/intqhc\/8.5.499"},{"key":"e_1_3_2_1_57_1","unstructured":"PMD Open Source Project. 2018. PMD- An extensible cross-language static code analyzer. https:\/\/pmd.github.io\/. Accessed: 28-01-19."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174086"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2005.09.002"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985729"},{"key":"e_1_3_2_1_61_1","unstructured":"SonarSource SA. 2018. SonarQube - The leading product for Continuous Code Quality. https:\/\/www.sonarqube.org\/. Accessed: 28-01-19."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.4135\/9780857020093"},{"key":"e_1_3_2_1_63_1","volume-title":"How developers diagnose potential security vulnerabilities with a static analysis tool","author":"Smith Justin","year":"2018","unstructured":"Justin Smith, Brittany Johnson, Emerson Murphy-Hill, Bei-Tseng Chu, and Heather Richter. 2018. How developers diagnose potential security vulnerabilities with a static analysis tool. IEEE Transactions on Software Engineering (2018)."},{"key":"e_1_3_2_1_64_1","volume-title":"Proceedings of the 18th Conference on USENIX Security Symposium (SSYM'09)","author":"Sunshine Joshua","year":"2009","unstructured":"Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, and Lorrie Faith Cranor. 2009. Crying Wolf: An Empirical Study of SSL Warning Effectiveness. In Proceedings of the 18th Conference on USENIX Security Symposium (SSYM'09). USENIX Association, Berkeley, CA, USA, 399--416. http:\/\/dl.acm.org\/citation.cfm?id=1855768.1855793"},{"key":"e_1_3_2_1_65_1","volume-title":"Symposium on Usable Privacy and Security. https:\/\/www.usenix.org\/system\/files\/conference\/soups2016\/soups2016-paper-weinberger.pdf.","author":"Weinberger Joel","year":"2016","unstructured":"Joel Weinberger and Adrienne Porter Felt. 2016. A week to remember: The impact of browser warning storage policies. In Symposium on Usable Privacy and Security. https:\/\/www.usenix.org\/system\/files\/conference\/soups2016\/soups2016-paper-weinberger.pdf."},{"key":"e_1_3_2_1_66_1","volume-title":"Proceedings of Graphics Interface","author":"Whalen Tara","year":"2005","unstructured":"Tara Whalen and Kori M Inkpen. 2005. Gathering evidence: use of visual security cues in web browsers. In Proceedings of Graphics Interface 2005. Canadian Human-Computer Communications Society, 137--144."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0003-6870(02)00009-1"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595676.1595691"}],"event":{"name":"ICSE '20: 42nd International Conference on Software Engineering","location":"Seoul South Korea","acronym":"ICSE '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","KIISE Korean Institute of Information Scientists and Engineers","IEEE CS"]},"container-title":["Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377811.3380387","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377811.3380387","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:39Z","timestamp":1750200099000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377811.3380387"}},"subtitle":["a grounded theory and online survey study of developer preferences for security warning types"],"short-title":[],"issued":{"date-parts":[[2020,6,27]]},"references-count":68,"alternative-id":["10.1145\/3377811.3380387","10.1145\/3377811"],"URL":"https:\/\/doi.org\/10.1145\/3377811.3380387","relation":{},"subject":[],"published":{"date-parts":[[2020,6,27]]},"assertion":[{"value":"2020-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}