{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T06:08:14Z","timestamp":1775023694559,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3427228.3427275","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T22:20:18Z","timestamp":1607552418000},"page":"234-248","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK"],"prefix":"10.1145","author":[{"given":"Sean","family":"Oesch","sequence":"first","affiliation":[{"name":"University of Tennessee Knoxville, United States of America"}]},{"given":"Ruba","family":"Abu-Salma","sequence":"additional","affiliation":[{"name":"University of Cambridge, United Kingdom"}]},{"given":"Oumar","family":"Diallo","sequence":"additional","affiliation":[{"name":"University of Tennessee Knoxville"}]},{"given":"Juliane","family":"Kr\u00e4mer","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Germany"}]},{"given":"James","family":"Simmons","sequence":"additional","affiliation":[{"name":"University of Tennessee Knoxville"}]},{"given":"Justin","family":"Wu","sequence":"additional","affiliation":[{"name":"Brigham Young University"}]},{"given":"Scott","family":"Ruoti","sequence":"additional","affiliation":[{"name":"University of Tennessee Knoxville, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.14722\/eurousec.2017.23006"},{"key":"e_1_3_2_1_2_1","volume-title":"USENIX Workshop on Free and Open Communications on the Internet (FOCI).","author":"Abu-Salma Ruba","year":"2018"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.65"},{"key":"e_1_3_2_1_4_1","volume-title":"USENIX Symposium on Usable Privacy and Security (SOUPS). 113\u2013130","author":"Bai Wei","year":"2016"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2003.11.001"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243747"},{"key":"e_1_3_2_1_7_1","volume-title":"USENIX Symposium on Usable Privacy and Security (SOUPS). 147\u2013157","author":"De\u00a0Luca Alexander","year":"2016"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00037"},{"key":"e_1_3_2_1_9_1","volume-title":"ACM Workshop on Values in Computing.","author":"Dodier-Lazaro Steve","year":"2017"},{"key":"e_1_3_2_1_10_1","volume-title":"European Data Protection: Coming of Age","author":"Finn L"},{"key":"e_1_3_2_1_11_1","unstructured":"Daniel Folkinshteyn. [n.d.]. Attachment reminder :: Add-ons for Thunderbird. https:\/\/addons.thunderbird.net\/en-US\/thunderbird\/addon\/attachment-reminder\/  Daniel Folkinshteyn. [n.d.]. Attachment reminder :: Add-ons for Thunderbird. https:\/\/addons.thunderbird.net\/en-US\/thunderbird\/addon\/attachment-reminder\/"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3230859"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/587078.587080"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1111\/1468-2389.00246"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3213586.3225236"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02692026"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180875.1180956"},{"key":"e_1_3_2_1_18_1","volume-title":"Is implementing the EU data protection directive in the United States irreconcilable with the first amendment?Government Information Quarterly 16, 2","author":"Kirtley E","year":"1999"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcom.12251"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222270406"},{"key":"e_1_3_2_1_21_1","unstructured":"Juan Ram\u00f3n\u00a0Ponce Mauri\u00e9s Kat Krol Simon Parkin Ruba Abu-Salma and M\u00a0Angela Sasse. 2017. Dead on arrival: Recovering from fatal flaws in email encryption tools. In Learning from Authoritative Security Experiment Results (LASER) Workshop. 49\u201357.  Juan Ram\u00f3n\u00a0Ponce Mauri\u00e9s Kat Krol Simon Parkin Ruba Abu-Salma and M\u00a0Angela Sasse. 2017. Dead on arrival: Recovering from fatal flaws in email encryption tools. In Learning from Authoritative Security Experiment Results (LASER) Workshop. 49\u201357."},{"key":"e_1_3_2_1_22_1","volume-title":"USENIX Security Symposium. 399\u2013414","author":"McGregor E","year":"2015"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.11.1.35.12567"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2016.0118"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1093\/poq\/nfh008"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00036"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313761"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858400"},{"key":"e_1_3_2_1_29_1","volume-title":"USENIX Symposium on Usable Privacy and Security (SOUPS). 211\u2013228","author":"Ruoti Scott","year":"2017"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338498.3358644"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.2307\/41166073"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1177\/1103308817734512"},{"key":"e_1_3_2_1_33_1","volume-title":"IEEE Symposium on Security and Privacy (S&P).","author":"Unger Nik"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretai.2007.03.004"},{"key":"e_1_3_2_1_35_1","volume-title":"USENIX Symposium on Usable Privacy and Security (SOUPS).","author":"Vance Anthony","year":"2019"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2018.23033"},{"key":"e_1_3_2_1_37_1","volume-title":"USENIX Symposium on Usable Privacy and Security (SOUPS). 47\u201362","author":"Vaziripour Elham","year":"2018"},{"key":"e_1_3_2_1_38_1","volume-title":"USENIX Symposium on Usable Privacy and Security (SOUPS). 29\u201347","author":"Vaziripour Elham","year":"2017"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837125"},{"key":"e_1_3_2_1_40_1","volume-title":"USENIX Symposium On Usable Privacy and Security (SOUPS). 1\u201318","author":"Woodruff Allison","year":"2014"},{"key":"e_1_3_2_1_41_1","volume-title":"Signal. In USENIX Symposium on Usable Privacy and Security (SOUPS).","author":"Wu Justin","year":"2019"},{"key":"e_1_3_2_1_42_1","volume-title":"USENIX Symposium on Usable Privacy and Security (SOUPS). 395\u2013409","author":"Wu Justin","year":"2018"}],"event":{"name":"ACSAC '20: Annual Computer Security Applications Conference","location":"Austin USA","acronym":"ACSAC '20"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427275","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427275","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:25Z","timestamp":1750197745000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427275"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":42,"alternative-id":["10.1145\/3427228.3427275","10.1145\/3427228"],"URL":"https:\/\/doi.org\/10.1145\/3427228.3427275","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}