{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:00:26Z","timestamp":1776106826272,"version":"3.50.1"},"reference-count":93,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2021,1,20]],"date-time":"2021-01-20T00:00:00Z","timestamp":1611100800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Comput.-Hum. Interact."],"published-print":{"date-parts":[[2021,2,28]]},"abstract":"<jats:p>Nudging is a promising approach, in terms of influencing people to make advisable choices in a range of domains, including cybersecurity. However, the processes underlying the concept and the nudge\u2019s effectiveness in different contexts, and in the long term, are still poorly understood. Our research thus first reviewed the nudge concept and differentiated it from other interventions before applying it to the cybersecurity area. We then carried out an empirical study to assess the effectiveness of three different nudge-related interventions on four types of cybersecurity-specific decisions. Our study demonstrated that the combination of a simple nudge and information provision, termed a \u201chybrid nudge,\u201d was at least as, and in some decision contexts even more effective in encouraging secure choices as the simple nudge on its own. This indicates that the inclusion of information when deploying a nudge, thereby increasing the intervention\u2019s transparency, does not necessarily diminish its effectiveness.<\/jats:p>\n          <jats:p>A follow-up study explored the educational and long-term impact of our tested nudge interventions to encourage secure choices. The results indicate that the impact of the initial nudges, of all kinds, did not endure. We conclude by discussing our findings and their implications for research and practice.<\/jats:p>","DOI":"10.1145\/3429888","type":"journal-article","created":{"date-parts":[[2021,1,20]],"date-time":"2021-01-20T17:52:01Z","timestamp":1611165121000},"page":"1-45","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":76,"title":["The Nudge Puzzle"],"prefix":"10.1145","volume":"28","author":[{"given":"Verena","family":"Zimmermann","sequence":"first","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]},{"given":"Karen","family":"Renaud","sequence":"additional","affiliation":[{"name":"University of Strathclyde and Rhodes University, Makhanda, Eastern Cape, South Africa"}]}],"member":"320","published-online":{"date-parts":[[2021,1,20]]},"reference":[{"key":"e_1_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3054926"},{"key":"e_1_2_2_2_1","volume-title":"Retrieved","author":"Albergotti Reed","year":"2014"},{"key":"e_1_2_2_3_1","volume-title":"Libertarian paternalism and the dangers of nudging consumers. King\u2019s Law Journal 23, 1","author":"Salazar Alberto","year":"2012"},{"key":"e_1_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpubeco.2011.03.003"},{"key":"e_1_2_2_5_1","volume-title":"Behavior and energy policy. Science 327, 5970","author":"Allcott Hunt","year":"2010"},{"key":"e_1_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702210"},{"key":"e_1_2_2_7_1","unstructured":"American Psychological Association. 2016. Ethical Principles of Psychologists and Code of Conduct. Retrieved from http:\/\/www.apa.org\/ethics\/code\/index.aspx.  American Psychological Association. 2016. Ethical Principles of Psychologists and Code of Conduct. Retrieved from http:\/\/www.apa.org\/ethics\/code\/index.aspx."},{"key":"e_1_2_2_8_1","volume-title":"More Android phones are using encryption and lock screen security than ever before. Retrieved","year":"2019"},{"key":"e_1_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2629487"},{"key":"e_1_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1093\/jleo\/ews020"},{"key":"e_1_2_2_11_1","volume-title":"Proceedings of the CHI Workshop on Persuasion, Nudge, Influence and Coercion. ACM","author":"Balebako Rebecca","year":"2011"},{"key":"e_1_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13164-015-0268-x"},{"key":"e_1_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1995.tb02031.x"},{"key":"e_1_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.311.7000.289"},{"key":"e_1_2_2_15_1","volume-title":"Retrieved","author":"Blog Elcomsoft","year":"2019"},{"key":"e_1_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1080\/15265161.2011.634481"},{"key":"e_1_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1080\/15265161.2015.1074304"},{"key":"e_1_2_2_18_1","volume-title":"Statistics for Human and Social Scientists: Limited Special Edition (Statistik f\u00fcr Human-und Sozialwissenschaftler: Limitierte Sonderausgabe)","author":"Bortz J\u00fcrgen"},{"key":"e_1_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1080\/15265161.2013.781710"},{"key":"e_1_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1017\/S1474746412000061"},{"key":"e_1_2_2_21_1","first-page":"773","article-title":"Code, nudge or notice","volume":"99","author":"Calo Ryan","year":"2014","journal-title":"Iowa Law Review"},{"key":"e_1_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300733"},{"key":"e_1_2_2_23_1","volume-title":"Many smartphone owners don\u2019t take steps to secure their devices. Retrieved","author":"Pew Research Center","year":"2019"},{"key":"e_1_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40477-1_5"},{"key":"e_1_2_2_25_1","volume-title":"Trost","author":"Cialdini Robert B.","year":"1998"},{"key":"e_1_2_2_26_1","volume-title":"Statistical Power Analysis for the Behavioral Sciences","author":"Cohen Jacob"},{"key":"e_1_2_2_27_1","volume-title":"What does not budge for any nudge?The American Journal of Bioethics 12, 2","author":"DiSilvestro Russell","year":"2012"},{"key":"e_1_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.joep.2011.10.009"},{"key":"e_1_2_2_29_1","volume-title":"MINDSPACE: Influencing behaviour for public policy. Retrieved","author":"Dolan Paul","year":"2010"},{"key":"e_1_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2018.8376210"},{"key":"e_1_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702249"},{"key":"e_1_2_2_32_1","volume-title":"Cookies Consent under the GDPR. Retrieved","author":"Compliant EU GDPR","year":"2019"},{"key":"e_1_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/3235895.3235897"},{"key":"e_1_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2018.1456150"},{"key":"e_1_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/2018810"},{"key":"e_1_2_2_36_1","volume-title":"Fenton","author":"Grassi Paul A.","year":"2017"},{"key":"e_1_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1017\/S1867299X00005468"},{"key":"e_1_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1017\/S1867299X00002762"},{"key":"e_1_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858273"},{"key":"e_1_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9760.2009.00351.x"},{"key":"e_1_2_2_41_1","volume-title":"BE360: Protecting Consumers from \u2018SLUDGE\u2019. Retrieved","author":"Hollingworth Crawford","year":"2020"},{"key":"e_1_2_2_42_1","unstructured":"Julian House Elizabeth Lyons and D. Soman. 2013. Towards a Taxonomy of Nudging Strategies. Rotman School of Management University of Toronto.  Julian House Elizabeth Lyons and D. Soman. 2013. Towards a Taxonomy of Nudging Strategies. Rotman School of Management University of Toronto."},{"key":"e_1_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11002-012-9186-1"},{"key":"e_1_2_2_44_1","unstructured":"Daniel Kahneman and Patrick Egan. 2011. Thinking Fast and Slow. Vol. 1. Farrar Straus and Giroux New York NY.  Daniel Kahneman and Patrick Egan. 2011. Thinking Fast and Slow. Vol. 1. Farrar Straus and Giroux New York NY."},{"key":"e_1_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1093\/pubmed\/fdv096"},{"key":"e_1_2_2_46_1","unstructured":"Dominik J. Leiner. 2014. SoSci survey (Version 2.5. 00-i) [Computer software]. https:\/\/www.soscisurvey.de\/.  Dominik J. Leiner. 2014. SoSci survey (Version 2.5. 00-i) [Computer software]. https:\/\/www.soscisurvey.de\/."},{"key":"e_1_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1080\/01973533.2017.1356304"},{"key":"e_1_2_2_48_1","volume-title":"What about nudges in the process industry? Exploring a new safety management tool. Journal of Loss Prevention in the Process Industries 50, Part A","author":"Lindhout Paul","year":"2017"},{"key":"e_1_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1111\/spc3.12297"},{"key":"e_1_2_2_50_1","volume-title":"Klagenfurth, Austria. Retrieved on","author":"Mayring Philipp","year":"2021"},{"key":"e_1_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466245"},{"key":"e_1_2_2_52_1","volume-title":"Identifying careless responses in survey data.Psychological Methods 17, 3","author":"Meade Adam W.","year":"2012"},{"key":"e_1_2_2_54_1","first-page":"1245","article-title":"Libertarian paternalism is an oxymoron","volume":"99","author":"Mitchell Gregory","year":"2004","journal-title":"Northwestern University Law Review"},{"key":"e_1_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1017\/bpp.2016.16"},{"key":"e_1_2_2_56_1","volume-title":"NSW Behavioural insights team. Retrieved","author":"Government NSW","year":"2019"},{"key":"e_1_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1177\/0032321716629487"},{"key":"e_1_2_2_58_1","unstructured":"European Federation of Psychologists\u2019 Association. 2005. Meta-Code of Ethics. Retrieved from https:\/\/www.bdp-verband.de\/binaries\/content\/assets\/beruf\/efpa_metacode_en.pdf.  European Federation of Psychologists\u2019 Association. 2005. Meta-Code of Ethics. Retrieved from https:\/\/www.bdp-verband.de\/binaries\/content\/assets\/beruf\/efpa_metacode_en.pdf."},{"key":"e_1_2_2_59_1","volume-title":"Proceedings of the Symposium on Usable Privacy and Security (SOUPS\u201915)","author":"Ohyama Takahiro","year":"2015"},{"key":"e_1_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10603-014-9256-2"},{"key":"e_1_2_2_61_1","volume-title":"An evaluation of dual-process theories of reasoning. Psychonomic Bulletin 8 Review 11, 6","author":"Osman Magda","year":"2004"},{"key":"e_1_2_2_62_1","first-page":"557","article-title":"Nudge: How far have we come?\u0152conomia. History, Methodology","volume":"6","author":"Osman Magda","year":"2016","journal-title":"Philosophy"},{"key":"e_1_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.01.004"},{"key":"e_1_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196830"},{"key":"e_1_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1080\/15265161.2015.1074303"},{"key":"e_1_2_2_66_1","volume-title":"n.d.. Encryption. Retrieved","author":"Source Project Android Open","year":"2019"},{"key":"e_1_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078829"},{"key":"e_1_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318142"},{"key":"e_1_2_2_69_1","volume-title":"Behavior change and energy use: Is a \u2018nudge","author":"Rasul Imran","year":"2012"},{"key":"e_1_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368860.3368864"},{"key":"e_1_2_2_71_1","volume-title":"Proceedings of the LASER Workshop. USENIX","author":"Renaud Karen","year":"2017"},{"key":"e_1_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2018.05.011"},{"key":"e_1_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1017\/bpp.2018.3"},{"key":"e_1_2_2_74_1","volume-title":"Content Analysis (Inhaltsanalyse)","author":"R\u00f6ssler Patrick"},{"key":"e_1_2_2_75_1","volume-title":"What counts as a nudge?The American Journal of Bioethics 12, 2","author":"Selinger Evan","year":"2012"},{"key":"e_1_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/844102.844117"},{"key":"e_1_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0140525X00003435"},{"key":"e_1_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10603-015-9289-1"},{"key":"e_1_2_2_79_1","first-page":"643","article-title":"Forcing people to choose is paternalistic","volume":"82","author":"Sunstein Cass R.","year":"2017","journal-title":"Missouri Law Review"},{"key":"e_1_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1017\/bpp.2016.3"},{"key":"e_1_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.2307\/1600573"},{"key":"e_1_2_2_82_1","volume-title":"UK. Retrieved","author":"Team Behavioural Insights","year":"2011"},{"key":"e_1_2_2_83_1","volume-title":"Sunstein","author":"Thaler Richard H.","year":"2008"},{"key":"e_1_2_2_84_1","volume-title":"Code of Human Research Ethics. Retrieved on","author":"The British Psychological Society","year":"2021"},{"key":"e_1_2_2_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783446.2783588"},{"key":"e_1_2_2_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3026050"},{"key":"e_1_2_2_88_1","doi-asserted-by":"publisher","DOI":"10.5555\/2362793.2362798"},{"key":"e_1_2_2_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.196"},{"key":"e_1_2_2_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/3012709.3012729"},{"key":"e_1_2_2_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557413"},{"key":"e_1_2_2_92_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.nutr.24.012003.132140"},{"key":"e_1_2_2_93_1","volume-title":"Digital nudging. Business 8 Information Systems Engineering 58, 6","author":"Weinmann Markus","year":"2016"},{"key":"e_1_2_2_94_1","volume-title":"The Manipulation of Choice: Ethics and Libertarian Paternalism","author":"White Mark"},{"key":"e_1_2_2_95_1","volume-title":"The forms and limits of choice architecture as a tool of government. Law 8 Policy 38, 3","author":"Yeung Karen","year":"2016"}],"container-title":["ACM Transactions on Computer-Human Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3429888","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3429888","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:45Z","timestamp":1750195905000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3429888"}},"subtitle":["Matching Nudge Interventions to Cybersecurity Decisions"],"short-title":[],"issued":{"date-parts":[[2021,1,20]]},"references-count":93,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,2,28]]}},"alternative-id":["10.1145\/3429888"],"URL":"https:\/\/doi.org\/10.1145\/3429888","relation":{},"ISSN":["1073-0516","1557-7325"],"issn-type":[{"value":"1073-0516","type":"print"},{"value":"1557-7325","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,20]]},"assertion":[{"value":"2020-01-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-10-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-01-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}