{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T04:49:07Z","timestamp":1772772547842,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T00:00:00Z","timestamp":1633910400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003495","name":"Hessisches Ministerium f\u00fcr Wissenschaft und Kunst","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003495","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["236615297"],"award-info":[{"award-number":["236615297"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,11]]},"DOI":"10.1145\/3481357.3481514","type":"proceedings-article","created":{"date-parts":[[2021,12,11]],"date-time":"2021-12-11T21:05:52Z","timestamp":1639256752000},"page":"141-150","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Nudge or Restraint: How do People Assess Nudging in Cybersecurity - A Representative Study in Germany"],"prefix":"10.1145","author":[{"given":"Katrin","family":"Hartwig","sequence":"first","affiliation":[{"name":"Technische Universit\ufffd\ufffdt Darmstadt, Germany"}]},{"given":"Christian","family":"Reuter","sequence":"additional","affiliation":[{"name":"Technische Universit\ufffd\ufffdt Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,12,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Nudging privacy: The behavioral economics of personal information","author":"Acquisti Alessandro","year":"2009","unstructured":"Alessandro Acquisti . 2009. Nudging privacy: The behavioral economics of personal information . IEEE security & privacy 7, 6 ( 2009 ), 82\u201385. Alessandro Acquisti. 2009. Nudging privacy: The behavioral economics of personal information. IEEE security & privacy 7, 6 (2009), 82\u201385."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3054926"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.70"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-86797-3_26"},{"key":"e_1_3_2_1_5_1","first-page":"18","article-title":"Nudging whom how: IT proficiency, impulse control and secure behaviour","volume":"49","author":"Briggs Debora","year":"2014","unstructured":"Debora Briggs , Lynne Jeske , Pam Coventry , and Aad van Moorsel . 2014 . Nudging whom how: IT proficiency, impulse control and secure behaviour . Networks 49 (2014), 18 . Debora Briggs, Lynne Jeske, Pam Coventry, and Aad van Moorsel. 2014. Nudging whom how: IT proficiency, impulse control and secure behaviour. Networks 49(2014), 18.","journal-title":"Networks"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40477-1_5"},{"key":"e_1_3_2_1_7_1","volume-title":"Public acceptability of government intervention to change health-related behaviours: a systematic review and narrative synthesis. BMC public health 13, 1","author":"Diepeveen Stephanie","year":"2013","unstructured":"Stephanie Diepeveen , Tom Ling , Marc Suhrcke , Martin Roland , and Theresa\u00a0 M Marteau . 2013. Public acceptability of government intervention to change health-related behaviours: a systematic review and narrative synthesis. BMC public health 13, 1 ( 2013 ), 756. Stephanie Diepeveen, Tom Ling, Marc Suhrcke, Martin Roland, and Theresa\u00a0M Marteau. 2013. Public acceptability of government intervention to change health-related behaviours: a systematic review and narrative synthesis. BMC public health 13, 1 (2013), 756."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2017.1403642"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2841113.2841115"},{"key":"e_1_3_2_1_10_1","volume-title":"Citizen approval of nudging interventions promoting healthy eating: the role of intrusiveness and trustworthiness. BMC public health 18, 1","author":"Evers Catharine","year":"2018","unstructured":"Catharine Evers , David Marchiori , Astrid Junghans , J. Cremers , and Denise De\u00a0Ridder . 2018. Citizen approval of nudging interventions promoting healthy eating: the role of intrusiveness and trustworthiness. BMC public health 18, 1 ( 2018 ), 1\u201310. Catharine Evers, David Marchiori, Astrid Junghans, J. Cremers, and Denise De\u00a0Ridder. 2018. Citizen approval of nudging interventions promoting healthy eating: the role of intrusiveness and trustworthiness. BMC public health 18, 1 (2018), 1\u201310."},{"key":"e_1_3_2_1_12_1","volume-title":"Public views on policies involving nudges. Review of philosophy and psychology 6, 3","author":"Hagman William","year":"2015","unstructured":"William Hagman , David Andersson , Daniel V\u00e4stfj\u00e4ll , and Gustav Tingh\u00f6g . 2015. Public views on policies involving nudges. Review of philosophy and psychology 6, 3 ( 2015 ), 439\u2013453. William Hagman, David Andersson, Daniel V\u00e4stfj\u00e4ll, and Gustav Tingh\u00f6g. 2015. Public views on policies involving nudges. Review of philosophy and psychology 6, 3 (2015), 439\u2013453."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1093\/pubmed\/fds003"},{"key":"e_1_3_2_1_14_1","volume-title":"Improving Memorized Secrets Through Gamification. In The 2021 European Symposium on Usable Security (EuroUSEC).","author":"Hartwig Katrin","year":"2021","unstructured":"Katrin Hartwig , Atlas Englisch , Jan\u00a0Pelle Thomson , and Christian Reuter . 2021 . Finding Secret Treasure? Improving Memorized Secrets Through Gamification. In The 2021 European Symposium on Usable Security (EuroUSEC). 2021. Katrin Hartwig, Atlas Englisch, Jan\u00a0Pelle Thomson, and Christian Reuter. 2021. Finding Secret Treasure? Improving Memorized Secrets Through Gamification. In The 2021 European Symposium on Usable Security (EuroUSEC). 2021."},{"key":"#cr-split#-e_1_3_2_1_15_1.1","doi-asserted-by":"crossref","unstructured":"Katrin Hartwig and Christian Reuter. 2021. Nudging Users Towards Better Security Decisions in Password Creation Using Whitebox-based Multidimensional Visualizations. Behaviour & Information Technology (BIT)(2021). https:\/\/doi.org\/10.1080\/0144929X.2021.1876167 10.1080\/0144929X.2021.1876167","DOI":"10.1080\/0144929X.2021.1876167"},{"key":"#cr-split#-e_1_3_2_1_15_1.2","doi-asserted-by":"crossref","unstructured":"Katrin Hartwig and Christian Reuter. 2021. Nudging Users Towards Better Security Decisions in Password Creation Using Whitebox-based Multidimensional Visualizations. Behaviour & Information Technology (BIT)(2021). https:\/\/doi.org\/10.1080\/0144929X.2021.1876167","DOI":"10.1080\/0144929X.2021.1876167"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3214271"},{"key":"e_1_3_2_1_17_1","volume-title":"American attitudes toward nudges.Judgment & Decision Making 11, 1","author":"Jung Y.","year":"2016","unstructured":"Janice\u00a0 Y. Jung and Barbara\u00a0 A. Mellers . 2016. American attitudes toward nudges.Judgment & Decision Making 11, 1 ( 2016 ). Janice\u00a0Y. Jung and Barbara\u00a0A. Mellers. 2016. American attitudes toward nudges.Judgment & Decision Making 11, 1 (2016)."},{"key":"e_1_3_2_1_18_1","volume-title":"Under consumers","author":"Junghans Astrid","year":"2015","unstructured":"Astrid Junghans , Tracy Cheung , and Denise De\u00a0Ridder . 2015. Under consumers \u2019 scrutiny-an investigation into consumers\u2019 attitudes and concerns about nudging in the realm of health behavior. BMC public health 15, 1 ( 2015 ), 336. Astrid Junghans, Tracy Cheung, and Denise De\u00a0Ridder. 2015. Under consumers\u2019 scrutiny-an investigation into consumers\u2019 attitudes and concerns about nudging in the realm of health behavior. BMC public health 15, 1 (2015), 336."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3188689"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.3151331"},{"key":"e_1_3_2_1_21_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS","author":"Kum Hye-Chung","year":"2019","unstructured":"Hye-Chung Kum , Eric\u00a0 D. Ragan , Gurudev Ilangovan , Mahin Ramezani , Qinbo Li , and Cason Schmit . 2019 . Enhancing privacy through an interactive on-demand incremental information disclosure interface: applying privacy-by-design to record linkage . In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). Hye-Chung Kum, Eric\u00a0D. Ragan, Gurudev Ilangovan, Mahin Ramezani, Qinbo Li, and Cason Schmit. 2019. Enhancing privacy through an interactive on-demand incremental information disclosure interface: applying privacy-by-design to record linkage. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019)."},{"key":"e_1_3_2_1_22_1","volume-title":"Models","author":"Lechner Ulrike","unstructured":"Ulrike Lechner . 2019. Future security: Processes or properties?\u2014Research directions in cybersecurity . In Models , Mindsets, Meta : The What, the How, and the Why Not ?Springer, 235\u2013246. Ulrike Lechner. 2019. Future security: Processes or properties?\u2014Research directions in cybersecurity. In Models, Mindsets, Meta: The What, the How, and the Why Not?Springer, 235\u2013246."},{"key":"e_1_3_2_1_23_1","volume-title":"Twelfth Symposium on Usable Privacy and Security (SOUPS","author":"Liu Bin","year":"2016","unstructured":"Bin Liu , Mads\u00a0Schaarup Andersen , Florian Schaub , Hazim Almuhimedi , Shikun\u00a0Aerin Zhang , Norman Sadeh , Yuvraj Agarwal , and Alessandro Acquisti . 2016 . Follow my recommendations: A personalized privacy assistant for mobile app permissions . In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). 27\u201341. Bin Liu, Mads\u00a0Schaarup Andersen, Florian Schaub, Hazim Almuhimedi, Shikun\u00a0Aerin Zhang, Norman Sadeh, Yuvraj Agarwal, and Alessandro Acquisti. 2016. Follow my recommendations: A personalized privacy assistant for mobile app permissions. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). 27\u201341."},{"key":"e_1_3_2_1_24_1","volume-title":"Waiting Makes the Heart Grow Fonder and the Password Grow Stronger. In Symposium on Usable Privacy and Security (SOUPS)-Posters. USENIX Association","author":"Malkin Nathan","year":"2013","unstructured":"Nathan Malkin . 2013 . Waiting Makes the Heart Grow Fonder and the Password Grow Stronger. In Symposium on Usable Privacy and Security (SOUPS)-Posters. USENIX Association , Newcastle, UK. 1\u20132. Nathan Malkin. 2013. Waiting Makes the Heart Grow Fonder and the Password Grow Stronger. In Symposium on Usable Privacy and Security (SOUPS)-Posters. USENIX Association, Newcastle, UK. 1\u20132."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152771.3156139"},{"key":"e_1_3_2_1_26_1","volume-title":"Thirteenth Symposium on Usable Privacy and Security (SOUPS","author":"Nicholson James","year":"2017","unstructured":"James Nicholson , Lynne Coventry , and Pam Briggs . 2017 . Can we fight social engineering attacks by social means? Assessing social salience as a means to improve phish detection . In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). 285\u2013298. James Nicholson, Lynne Coventry, and Pam Briggs. 2017. Can we fight social engineering attacks by social means? Assessing social salience as a means to improve phish detection. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). 285\u2013298."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Rosemary Pacini and Seymour Epstein. 1999. The relation of rational and experiential information processing styles to personality basic beliefs and the ratio-bias phenomenon.Journal of personality and social psychology 76 6(1999) 972.  Rosemary Pacini and Seymour Epstein. 1999. The relation of rational and experiential information processing styles to personality basic beliefs and the ratio-bias phenomenon.Journal of personality and social psychology 76 6(1999) 972.","DOI":"10.1037\/0022-3514.76.6.972"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Eyal Peer Serge Egelman Marian Harbach Nathan Malkin Arunesh Mathur and Alisa Frik. 2019. Nudge me right: Personalizing online nudges to people\u2019s decision-making styles. Available at SSRN 3324907(2019).  Eyal Peer Serge Egelman Marian Harbach Nathan Malkin Arunesh Mathur and Alisa Frik. 2019. Nudge me right: Personalizing online nudges to people\u2019s decision-making styles. Available at SSRN 3324907(2019).","DOI":"10.2139\/ssrn.3324907"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1017\/S1930297500002898","article-title":"Do minorities like nudges? The role of group norms in attitudes towards behavioral policy","volume":"14","author":"Pe\u2019er Eyal","year":"2019","unstructured":"Eyal Pe\u2019er , Yuval Feldman , Eyal Gamliel , Limor Sahar , Ariel Tikotsky , Nurit Hod , and Hilla Schupak . 2019 . Do minorities like nudges? The role of group norms in attitudes towards behavioral policy . Judgment and Decision Making 14 , 1 (2019), 40 . Eyal Pe\u2019er, Yuval Feldman, Eyal Gamliel, Limor Sahar, Ariel Tikotsky, Nurit Hod, and Hilla Schupak. 2019. Do minorities like nudges? The role of group norms in attitudes towards behavioral policy. Judgment and Decision Making 14, 1 (2019), 40.","journal-title":"Judgment and Decision Making"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1093\/medlaw\/fwt022"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445658"},{"key":"e_1_3_2_1_32_1","volume-title":"Do Europeans like nudges?Judgment and Decision making 11, 4","author":"Reisch A.","year":"2016","unstructured":"Lucia\u00a0 A. Reisch and Cass\u00a0 R. Sunstein . 2016. Do Europeans like nudges?Judgment and Decision making 11, 4 ( 2016 ), 310\u2013325. Lucia\u00a0A. Reisch and Cass\u00a0R. Sunstein. 2016. Do Europeans like nudges?Judgment and Decision making 11, 4 (2016), 310\u2013325."},{"key":"e_1_3_2_1_33_1","volume-title":"The LASER Workshop: Learning from Authoritative Security Experiment Results (LASER","author":"Renaud Karen","year":"2017","unstructured":"Karen Renaud , Verena Zimmerman , Joseph Maguire , and Steve Draper . 2017 . Lessons learned from evaluating eight password nudges in the wild . In The LASER Workshop: Learning from Authoritative Security Experiment Results (LASER 2017). 25\u201337. Karen Renaud, Verena Zimmerman, Joseph Maguire, and Steve Draper. 2017. Lessons learned from evaluating eight password nudges in the wild. In The LASER Workshop: Learning from Authoritative Security Experiment Results (LASER 2017). 25\u201337."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2018.05.011"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1017\/bpp.2018.3"},{"key":"e_1_3_2_1_36_1","unstructured":"M.\u00a0Angela Sasse and Ivan Flechais. 2005. Usable security: Why do we need it? How do we get it?O\u2019Reilly.  M.\u00a0Angela Sasse and Ivan Flechais. 2005. Usable security: Why do we need it? How do we get it?O\u2019Reilly."},{"key":"e_1_3_2_1_37_1","volume-title":"Decision-making style: The development and assessment of a new measure. Educational and psychological measurement 55, 5","author":"Scott G","year":"1995","unstructured":"Susanne\u00a0 G Scott and Reginald\u00a0 A Bruce . 1995. Decision-making style: The development and assessment of a new measure. Educational and psychological measurement 55, 5 ( 1995 ), 818\u2013831. Susanne\u00a0G Scott and Reginald\u00a0A Bruce. 1995. Decision-making style: The development and assessment of a new measure. Educational and psychological measurement 55, 5 (1995), 818\u2013831."},{"key":"e_1_3_2_1_38_1","volume-title":"Sixteenth Symposium on Usable Privacy and Security (SOUPS","author":"Story Peter","year":"2020","unstructured":"Peter Story , Daniel Smullen , Alessandro Acquisti , Lorrie\u00a0Faith Cranor , Norman Sadeh , and Florian Schaub . 2020 . From Intent to Action: Nudging Users Towards Secure Mobile Payments . In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). 379\u2013415. Peter Story, Daniel Smullen, Alessandro Acquisti, Lorrie\u00a0Faith Cranor, Norman Sadeh, and Florian Schaub. 2020. From Intent to Action: Nudging Users Towards Secure Mobile Payments. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). 379\u2013415."},{"key":"e_1_3_2_1_39_1","volume-title":"Behavioral insights all over the world? Public attitudes toward nudging in a multi-country study. Public Attitudes Toward Nudging in a Multi-Country Study (February 21","author":"Sunstein R.","year":"2017","unstructured":"Cass\u00a0 R. Sunstein , Lucia\u00a0 A. Reisch , and Julius Rauber . 2017. Behavioral insights all over the world? Public attitudes toward nudging in a multi-country study. Public Attitudes Toward Nudging in a Multi-Country Study (February 21 , 2017 ) (2017). Cass\u00a0R. Sunstein, Lucia\u00a0A. Reisch, and Julius Rauber. 2017. Behavioral insights all over the world? Public attitudes toward nudging in a multi-country study. Public Attitudes Toward Nudging in a Multi-Country Study (February 21, 2017) (2017)."},{"key":"e_1_3_2_1_40_1","unstructured":"Richard\u00a0H. Thaler and Cass\u00a0R. Sunstein. [n.d.]. Nudge: Improving decisions about health wealth and happiness.  Richard\u00a0H. Thaler and Cass\u00a0R. Sunstein. [n.d.]. Nudge: Improving decisions about health wealth and happiness."},{"key":"e_1_3_2_1_41_1","volume-title":"Information and Communication Technologies in Tourism","author":"Tussyadiah Iis","year":"2019","unstructured":"Iis Tussyadiah , Shujun Li , and Graham Miller . 2019. Privacy protection in tourism: Where we are and where we should be heading for . In Information and Communication Technologies in Tourism 2019 . Springer , 278\u2013290. Iis Tussyadiah, Shujun Li, and Graham Miller. 2019. Privacy protection in tourism: Where we are and where we should be heading for. In Information and Communication Technologies in Tourism 2019. Springer, 278\u2013290."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3026050"},{"key":"e_1_3_2_1_43_1","volume-title":"Presented as part of the 21st USENIX Security Symposium (USENIX Security 12). 65\u201380.","author":"Ur Blase","unstructured":"Blase Ur , Patrick\u00a0Gage Kelley , Saranga Komanduri , Joel Lee , Michael Maass , Michelle\u00a0 L Mazurek , Timothy Passaro , Richard Shay , Timothy Vidas , Lujo Bauer , 2012. How does your password measure up? the effect of strength meters on password creation . In Presented as part of the 21st USENIX Security Symposium (USENIX Security 12). 65\u201380. Blase Ur, Patrick\u00a0Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle\u00a0L Mazurek, Timothy Passaro, Richard Shay, Timothy Vidas, Lujo Bauer, 2012. How does your password measure up? the effect of strength meters on password creation. In Presented as part of the 21st USENIX Security Symposium (USENIX Security 12). 65\u201380."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3429888"}],"event":{"name":"EuroUSEC '21: European Symposium on Usable Security 2021","location":"Karlsruhe Germany","acronym":"EuroUSEC '21"},"container-title":["Proceedings of the 2021 European Symposium on Usable Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3481357.3481514","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3481357.3481514","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:32Z","timestamp":1750191452000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3481357.3481514"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,11]]},"references-count":44,"alternative-id":["10.1145\/3481357.3481514","10.1145\/3481357"],"URL":"https:\/\/doi.org\/10.1145\/3481357.3481514","relation":{},"subject":[],"published":{"date-parts":[[2021,10,11]]},"assertion":[{"value":"2021-12-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}